Analysis
-
max time kernel
36s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zpr.io/4RazWWi7rTeu
Resource
win10v2004-20240508-en
General
-
Target
https://zpr.io/4RazWWi7rTeu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608142784518091" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 212 wrote to memory of 320 212 chrome.exe chrome.exe PID 212 wrote to memory of 320 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 528 212 chrome.exe chrome.exe PID 212 wrote to memory of 5048 212 chrome.exe chrome.exe PID 212 wrote to memory of 5048 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe PID 212 wrote to memory of 944 212 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://zpr.io/4RazWWi7rTeu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85178ab58,0x7ff85178ab68,0x7ff85178ab782⤵PID:320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:22⤵PID:528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:5048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1660 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:12⤵PID:4984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:12⤵PID:772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4328 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:12⤵PID:3740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:4608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:3156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:3332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:4864
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1812,i,17222438519241886673,6672916764154347603,131072 /prefetch:82⤵PID:2476
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5247180b6bfd543481f9dc40b52c94dbd
SHA123bddf4c19befda5ef18e2b738226236d3652e09
SHA2560437a684755d46e2b750d17ca4e728f1cb5118bc8cc669e132d320961dbdafca
SHA512a6061af124ae057724b19efbfaa5dfc01702577e168934a799382463b09b9063e3a9873bbbe5b84799e32872e2098e9f0751effd8dae707bd4bb174d8edb01fe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD521125fd6dc43980f8aafdc9b41f4b8d8
SHA1dcd6fdaafad9850267219bc08cd02e9ac0fbba40
SHA2566bf4a13a8cae1b63394dafacb625fc8740128771bc762a928e128d41d801d322
SHA512e03b6b78846d0428e83c4dbb761a82c4bd934e0f232c5f1e04dc6ead1968af2acb0b51fb89897932356bbd3e441c9ef0907c11bf6666cbe940547eee0b2f7c7e
-
Filesize
7KB
MD5ade9c999f5d7984842dc9ea34ce3341b
SHA14294f6674828db5f9b6bf465a2367e5b76b0489c
SHA2562d9660236f35b37cea9cf13701a592cb2e6138c68bcb22f4c0076dcd469db04b
SHA512768246307444eff1a820c5c77ae28eadd1e5371f83b82409793642ebdda57121c07ee5ce474e468969ff80f01d9c11dbf4914b7f2e8e3fb4ae0a7d8604bad205
-
Filesize
257KB
MD5919025ea62dad0719dc398aed1f3baab
SHA1f24cc8dd02fabceba17c55b3278b808cfba18010
SHA25692343be577dd86af2c5360ecaf6452ff086b0f7f2f43001f068bfcbb61dd7984
SHA512760a4b3781c1afe05eb8cf0aee8763e0733c6863e96c72a2237be5600a68a433404b5621db1e14734d2635622db01538a3baf99991bc94b3a2acf5ea249967ef
-
Filesize
257KB
MD5052872c10fb2892ca11ab2d8f9c3bcaf
SHA149db76e6f0a296113ff1e2ad07e13b533a54ae96
SHA25674887f602946c7916527284789cb97570c221d470f69920df7d8fa95e26f8362
SHA5128947d617eae13629159a93999b61c2204ede37e7fa10f25b5e2fddbb3778b724ef47e6aa4f5ebc5ae134dea7bf4c0e1f8accc465cd81b9476a9801a3565534ee
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e