Analysis
-
max time kernel
1799s -
max time network
1720s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/05/2024, 15:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/search?q=google&oq=google&gs_lcrp=EgZjaHJvbWUqEAgAEAAYgwEY4wIYsQMYgAQyEAgAEAAYgwEY4wIYsQMYgAQyEwgBEC4YgwEYxwEYsQMY0QMYgAQyDQgCEAAYgwEYsQMYgAQyDQgDEAAYgwEYsQMYgAQyBggEEEUYPDIGCAUQRRg8MgYIBhBFGDwyBggHEEUYPNIBCDExOTZqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8&safe=active&ssui=on
Resource
win11-20240426-en
General
-
Target
https://www.google.com/search?q=google&oq=google&gs_lcrp=EgZjaHJvbWUqEAgAEAAYgwEY4wIYsQMYgAQyEAgAEAAYgwEY4wIYsQMYgAQyEwgBEC4YgwEYxwEYsQMY0QMYgAQyDQgCEAAYgwEYsQMYgAQyDQgDEAAYgwEYsQMYgAQyBggEEEUYPDIGCAUQRRg8MgYIBhBFGDwyBggHEEUYPNIBCDExOTZqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8&safe=active&ssui=on
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609523239993483" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 976 chrome.exe 976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2388 5100 chrome.exe 78 PID 5100 wrote to memory of 2388 5100 chrome.exe 78 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 2400 5100 chrome.exe 80 PID 5100 wrote to memory of 492 5100 chrome.exe 81 PID 5100 wrote to memory of 492 5100 chrome.exe 81 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82 PID 5100 wrote to memory of 3256 5100 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/search?q=google&oq=google&gs_lcrp=EgZjaHJvbWUqEAgAEAAYgwEY4wIYsQMYgAQyEAgAEAAYgwEY4wIYsQMYgAQyEwgBEC4YgwEYxwEYsQMY0QMYgAQyDQgCEAAYgwEYsQMYgAQyDQgDEAAYgwEYsQMYgAQyBggEEEUYPDIGCAUQRRg8MgYIBhBFGDwyBggHEEUYPNIBCDExOTZqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8&safe=active&ssui=on1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb6559ab58,0x7ffb6559ab68,0x7ffb6559ab782⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:22⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:82⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4168 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:82⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 --field-trial-handle=1728,i,8408819896347458792,7787708472706556297,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
Filesize
144B
MD56945edaf9e3e3c7b1f7eb0ea76619a93
SHA18a423ad5b4dca70a657f94f3bc75da1003e311c8
SHA2563a5508594fd98de3dbbc1bec334b8d2147b6b8af1485a486bc53c1a0c4e42321
SHA5123cf0b95ffc8fee5662106e513e375ef6a75235a0c7a6d5b51655e2f67c96a29a0cd248c4846d85e167271a84d5e4e6e2657f63696e1beb4fe645104ab5ad6672
-
Filesize
2KB
MD5e91a31c646b4cf49921265252ed51f5b
SHA1b8925ad88e6698996a7edebd91a4591aa8a3670b
SHA25686b2b7c9693c9fe944ef92cf32c3bf4f08eccdd1bb8b9ea33b77020e71511825
SHA5128c1229b01c630d8977ae08342f79e32bb38c5a75adb9ec883509ce8ad78d1f815861990d79f9865e68d1dc6c12b175e6da3b766627416b5b6904ff2be33afd9c
-
Filesize
2KB
MD54becac281bfb71e0ef9e58b5a82a0c72
SHA15b46a398cbf36207dd24ac62f81020eb22e4398e
SHA2560ad55986d37c8ce3adc0851b1244e27a719b138f9e018d684c55d5a305a3e10b
SHA512c1bd72689d82eb14d751c4446d4b8c84163e7b52c10a2d6d3936502d0b2c033eede1d0a127e5b02222c4a4be424d76b69267397205acb1991f67a6174b7fc876
-
Filesize
2KB
MD52b904800e0e8d5dbab15193803a70c1a
SHA1043a2cb0970f9c1ea87ad087965141e54041610b
SHA256b2172ca9f520b6c7b59a1b15fc52db3a9750703d32f286ed90bf9a4ec733b996
SHA512b601857f201714177471dd028a899115047970b7149231b04af37cf73d9e7414d6b39cd402197be86a3b8209eb8c660070d0229d9e97816ec3db1948d0c6379b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5457256e276c0c271991e371bd77447ba
SHA168527f316e59a61870a6e06919cc94252e87c793
SHA2567abf924c9497ee5eb810413faf4f9021db9a57685f918b3579b1ba92be4c1097
SHA5121fbf0a5868cf1ef622e754f4fe360e17a8d00e38f284195303a91cb4aa0d1d05366ff69be4a424cd4554aa6c159e3d2448680f772476e9e6657683ff90a1e3cd
-
Filesize
7KB
MD54cca795d30da858df7be6b72750bef5f
SHA1b9fd918a5225401dc09f8dcc4bb40fabd56d3246
SHA25635c3f2db57e87b6fdc796ff4e6537f9ab44d12d56a8bbed25a1b298dec5e7e74
SHA5128b5fc4929e9b1c01a1ac9c732ec889d19f441ae055c37a3087bd075c223797ad6413a917b114a377781e5b3ca547e586ce65a3ed89fc1ed3da0a0739490bf59b
-
Filesize
130KB
MD5b279a667159ae67cc722e5300178743c
SHA1fbaad5749623442e904d5afd8b39635e8aa87fda
SHA256efbdd8de4a265f7a2499ea2bafc6ea951b902a20442c506b59b53e611d2a09e6
SHA5121c8b4db0c39a8435a998428a9c074d3bc42f6aab76fd36452dcb3825b318faeba2189c6ebda57c036b461a00913c86693ee8327447a98cd75db4411b47804249