Analysis
-
max time kernel
255s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wetransfer.com/downloads/f6261d5f5a675ae1f164135eae96f4d820240520054446/0a350e272f84aef9e99cc9ad80247fd820240520054446/c716db
Resource
win10v2004-20240508-en
General
-
Target
https://wetransfer.com/downloads/f6261d5f5a675ae1f164135eae96f4d820240520054446/0a350e272f84aef9e99cc9ad80247fd820240520054446/c716db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608166940074796" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2476 chrome.exe 2476 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2476 chrome.exe 2476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2476 wrote to memory of 528 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 528 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 1836 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2388 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2388 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe PID 2476 wrote to memory of 2964 2476 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wetransfer.com/downloads/f6261d5f5a675ae1f164135eae96f4d820240520054446/0a350e272f84aef9e99cc9ad80247fd820240520054446/c716db1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ffe676dab58,0x7ffe676dab68,0x7ffe676dab782⤵PID:528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:22⤵PID:1836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:82⤵PID:2388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:82⤵PID:2964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1808 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:12⤵PID:3972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:12⤵PID:4956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:82⤵PID:2664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1912,i,5305974561863243675,16359204146786765317,131072 /prefetch:82⤵PID:2220
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD57fdc45c7d51b190f18ae8d1497ec1bdd
SHA18ae4c5ebcda529b87a5c701ccf0bbe15b9c70475
SHA2561bf0b48e06ff12ed62e7cf438df2b071e6f20b486d27eef9709c542800cc601c
SHA5126f3d8df3da9db4c046039f873a2c5f074d513726595bd9a8b1a8984db5299fff29659793585fccc316dcf6f4779558637a0caef2b96821d6443be50a8e8cdbb7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD58e9c8442a98507bd72fb4c9b16a96577
SHA16fbcfdee0199dee489268835171a592c8d557a14
SHA256c13a517070913f7be871eb02e1a904980f4372ac2c913d0a6724ce70448adc92
SHA512d32ce93cb2ae7140c9db76091e5454b2de30950c2f013c0ffb06b3895c050ee074e82f2fa131d3348543ae543894396a820d8ff92707e0029aa624b35fdca30a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55df6afcd4a3e0f70194aea9a6cbc05cc
SHA1426beeead98a163c4455b55d3c230c8dc032d814
SHA256cbb9001570256b753e526401b13f2c7bab422bb3772bda85556bb4bedc925572
SHA512d382a5146bab91f2c4bd9a80a9607ffa488f78d6e2b28a1c52cac5d019c2c00689378cef9b67c581e59c8cb53ed136d6f6cc6ff18d0dda40aafb90ff006eb5af
-
Filesize
1KB
MD5077e99bde0102ecf598e88f81f005836
SHA175d2643153b709b0ba8250eb8096971b287a34fb
SHA256d12b63427011511dcfbbd3e6322ed0cffc7ec679a475b525a0ab9f416b797931
SHA51267142bd21069b8106a8e4f1ecbde0fd76631bcb4a45dcd1d84b0205161d76cf6136e0ef53ce8a200c335220dbe464c6838fccf6cac145d04d8d0430c671911e8
-
Filesize
7KB
MD55e254a5bf4aa1602622b7b2c0a30076b
SHA1d548ec5e6554c1074152ca90c663dcab5887d5d1
SHA256be2c0ca20a6c56b91a8d3ebb7aa795de8a2ba5fc4dcb291e198bc0a11c974d63
SHA512707490aac6a24c90e7815950ed47599f0c1560f792c9f9083385fa85e09483349f465c695ba911a2fc7c183c95c99356654be0dd58cec0195a5ee8c56882fa84
-
Filesize
7KB
MD529ca5a4dde0d5a6bdbb362efd35552fc
SHA151daaff1741d6781481a36064a5e140077c05266
SHA25676f49406b8f4596819625d8b44d167dc9f41bc1b4e1d8f0b4275d283574683c7
SHA5120e63e063ef7f8dda00165d912140850c1004ae1ee6805aaf5d30e0c73f9490fea3c790abd5dcef7b748e9b1db6783162e6348107f6b3a8ef9393affd10ee2fb5
-
Filesize
257KB
MD5654fe93f622400765172fb1137052c40
SHA175c32ebaacc37959efed916a5a6d1262a1261814
SHA2564494cf3d8305d3d1d784f46f8ac09b5fc48a199cd3d1e1fc825313ab406ea798
SHA51258668980b38cde7fc06f2df43edf0d7de2c456684562ab7bd619df789995251836f16dc731610bf167049f7809de307a47d2a2882b299814bd635acb0b9cadac
-
Filesize
257KB
MD53bc8e9976f0d5cb4fefca0ead505f5d4
SHA19ae919f90fadc75f7b48ee1a3af31d1df5291efc
SHA2566f734efbcb0aae8f1e901ce781de37e3237e95eb497ba3a23211be104c1455be
SHA512d0254b0d77f0527485ddad9727f218b11f9fe0f22243225e994a9576e33be2e236f6c7ab5aac48844882289179b6c816e132c95626ed4913aa094e3bedbde8e8
-
Filesize
257KB
MD5a680c9e30c9bd7d06c7feae441e5c1f5
SHA1be8ed41f7210407d8a0fb3bca898f84081a65bd3
SHA256f7cdee5ee32cbaad0a55f65e9f28035afc012f6a36ca2e8c57356818d7973670
SHA512b4ab42f5030d8f2e32e86e1fd723efdabb840fa9b9caec73fc7cc7e671a4c00da4ad4ad4a63634981f81ceb798a9b4b6454e8e2c1932e1d32e48b4104cdb86b6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e