Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 23:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://smallurl.co/gKfhl
Resource
win11-20240426-en
General
-
Target
https://smallurl.co/gKfhl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608925754489451" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4484 chrome.exe 4484 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4484 wrote to memory of 928 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 928 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 5084 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 484 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 484 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe PID 4484 wrote to memory of 3912 4484 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://smallurl.co/gKfhl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe1408ab58,0x7ffe1408ab68,0x7ffe1408ab782⤵PID:928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:22⤵PID:5084
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:82⤵PID:484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:82⤵PID:3912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:12⤵PID:3364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:12⤵PID:2372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3856 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:12⤵PID:3500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4400 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:82⤵PID:4612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4300 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:82⤵PID:2756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1452 --field-trial-handle=1804,i,4836941548949599417,17201313085162181870,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD508dc07bed102b00c406253c9c8a0522d
SHA1cda0864a45ccbec0e1194b1d13ac0ff067e78eb6
SHA2569a8acd153a52b51c8cf58babfd2a531b9f751d0a0f2c22cd93a3119d23173b00
SHA512b10126032d2a6c0c95d4733babb7b5bee801db1010d877b03cd19fa3ec0bb896531d653d949b20603f2ee6f0e3b4008a7042887e09efaa05a16ec0f36cd25f55
-
Filesize
1KB
MD5fe30e884dffaeebf77bcd7f4b8317cf1
SHA1e58f2e037c2d905088154b886ab05e72b726aa74
SHA256a6c6230781df6ac043f27810fd7ede7b421883432c19a67e697f6667fc2bc40b
SHA512f65d65f76f7f86fd857d784bab9d8dd5227e2d1f035d3518e0d80fee291844fcc62c34660088c8ea9465c190492f675ae7296951ea59bbc683d2e53cb1ac6818
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5fef5abec8831e923112b076ff4e877f4
SHA1d9b856ae317c9e94b66c6f43cba60d4f64d7a7dc
SHA256847f5e72d564aa54cd04b5a7213eff834ae7e44dd920bbfed2ffd3228547df32
SHA512e2878333911051033bac4578d9319b4c6e3071b0e5694cb4bab8a694ef9ca7e670707af8c0c732a0dee9ffe56d5e0288bc7b08af88f398e3b7c2ea8918b31073
-
Filesize
130KB
MD532258c5ec5dace8f4d96113a79b4683a
SHA1b5109f48469903e60a22bc29d044abf469f09b37
SHA256f79c64af6194034f7d77341b8e74efb557dfded1dd0433bb9efbddd1ca098fa9
SHA512fcf50d311a7ca68eec479b7018bae303a51778e5a5d8e780286330ef63662cde03cae634a85f8204ed8220186c42fe2aa623b0d5645d2c117d57efe0312f5685
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e