Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 16:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://forms.gle/chyvZPtdzUWCTLf66
Resource
win10v2004-20240508-en
General
-
Target
http://forms.gle/chyvZPtdzUWCTLf66
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608684484405402" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3968 2552 chrome.exe 82 PID 2552 wrote to memory of 3968 2552 chrome.exe 82 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1320 2552 chrome.exe 83 PID 2552 wrote to memory of 1492 2552 chrome.exe 84 PID 2552 wrote to memory of 1492 2552 chrome.exe 84 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85 PID 2552 wrote to memory of 3848 2552 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://forms.gle/chyvZPtdzUWCTLf661⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab782⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:22⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2820 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3872 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4260 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4412 --field-trial-handle=1944,i,18143155506281101295,4795719068106147730,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5706fd624dc227b2ee2a588a7be9c1d40
SHA1a4937c0677691f3e6cf5609afd1ea389a0ef0778
SHA2563ef193ca9db07a46ce6fa8cfb8a8c39d3b7980ab0b154d291a775b89bf14b619
SHA512b1f7fad6aea38800d3d7124691671196b47fe51c5fb4e71900b74a72118590859adc34d4cd6beb1e19aad21032a9d19c4e7ffb92df1cd5d32c919372ba920723
-
Filesize
3KB
MD5a7129d2809bd22d37beb632623da21ab
SHA1809e1ea8160634fe6e7e89180136d793c46e886b
SHA25601366dc915667076b5193b6ffda6e7bbe8a33357115228567a3af58cdbf850d4
SHA5128149f5eaa64efd764cfee26b2eb1e34bc1da0fa2b13508962319d1679ca1740c26c2c9eb4543dcfd4256e68dfe99c8a2470b0090c977836ffa5f09baba0b7e7a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5163ad583574856f879e11c928e443388
SHA1a27b48e4746e0367b9ea33dd46d1dd5c26e6ff21
SHA256549d3352ca012527e09a112be5758a3312f10a8443cec0edc33d70b45b443e3d
SHA5121bbf2c067ebc55c1b091b3e72707810420ef141302fa04bb7059980461282c441a9cd8336606f54aa7bec1d553cce639e01a2aff3bce918dabe3e161add81697
-
Filesize
7KB
MD52f298c731c6100cb4bbb437ded54b34d
SHA1196d78166c8055922dfefc29a6d7d263edfcbb92
SHA2567a2d38f6d45f4544778409cf6bafaa5324f93bb2e78716844da393abeddc4d9b
SHA5120ca61b0ccf1e1564b4881f7da8cc51eb1178e57e8517238f7f1385a79283fe7f39392b91b810a5d801f2d1927c87ff1489377822ccc1a30f000b7c522f45d3c1
-
Filesize
257KB
MD5dceae40c6c62f98299141b0d33d4c05b
SHA16314bbba3258ae91dd2f8c867cce332fc7d6ec05
SHA256a28473ba4ae49adab5f8b20771250d1b62336d59dad67cbb88f3cec0629368b6
SHA512e02a03d0857e9a67fe2b582df7138d04ad2d803e21bdc0aa544a352657f165dcb6ce01b875326c476eef04e16df27110f9a78fcef3166d31878342c286a8e8b3
-
Filesize
257KB
MD591a1af174dc448e90ec99ddb41fdae32
SHA158f8b10b495b9d303a2a900905339438ea7d4894
SHA256ebad03c03d9ec0948add335171fc3982bf62317dc547287a50dd64c44d504542
SHA512c9218c9d9fdb0466d1ebb315d60c24ca2cb557bd79e46a9672586640da10869acc08f16b5c810b623e5ec30d28f30644683a7db12bda4abfed3ec63f50809eb7
-
Filesize
277KB
MD5222b7abde23a6e1920a20eace7014c57
SHA13af397bbc66173aa5de5582c2d3a34eb938f675f
SHA256b0077a80907fcc63f70aeb9897c85006488398b4ebeb6250ba0e0c5135acda3a
SHA512f84911a36d142b6b50d5cbd12088b13663b2a778f2196636f7ed49413780c82223811f8c2b1136aae987daa9fec6d1767fc7daaa07427790f16b5c159b2d2966
-
Filesize
257KB
MD5e0f30d1c49682e4376d0ccd266d6cdc0
SHA1b519ec5064265f16caeb39e130f38311f22b152d
SHA2560ac8a8d901481a40b6a47290889c5fb3d8ce923bd5c9cc4672b4cae6fc71bc04
SHA512502aefad710d19fef596b9d25f16976f64e89658ce51f9711c57147a49ac38ee08ab52037eba50f9d39dddddccfde5d9c315834d791e958cfb282e55ce885847
-
Filesize
91KB
MD58b2ef290bd015a3222ef84172d95e126
SHA19f5ba832d09d25cda054944129d581a6dc92cd4c
SHA2567a634fdc3aef488f900a09a3ea761389e544b676177652807e252755f7da5838
SHA512feafd9f05146fa9f7e6219b047647d153e214b926d9c5b48552047f04e3e48f74fdda7e8e0714e137cda61c81f231138f08489b0d4d512902332ba2f755f05b8
-
Filesize
88KB
MD5c8c3b72d750e18e8a0249ad75938f0c1
SHA127940be4004ec079e014d62afc0fa8c15da0f4b0
SHA256eb22d39267d689d6f0a1e0baec2f4219c86b41f5af311dd99852ce11ca369311
SHA512c7a5ede32083deb7bdbeb4f653515eab8efb185319d3d3e131adede6595f07e67052e77de685cc48a6e36c730755ad030ccc7377d46cdf73f2abdb5cb08c9fd8