Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/05/2024, 07:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.at/HTXXk
Resource
win10-20240404-en
General
-
Target
https://shorturl.at/HTXXk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133612702542248985" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 168 chrome.exe 168 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 4472 168 chrome.exe 74 PID 168 wrote to memory of 4472 168 chrome.exe 74 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4884 168 chrome.exe 76 PID 168 wrote to memory of 4220 168 chrome.exe 77 PID 168 wrote to memory of 4220 168 chrome.exe 77 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78 PID 168 wrote to memory of 1032 168 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shorturl.at/HTXXk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaffc09758,0x7ffaffc09768,0x7ffaffc097782⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:22⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2804 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4436 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4564 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4456 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 --field-trial-handle=1820,i,15011261156581729796,2740495077232393012,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5d0af11b1ea62d8c2c3724306352a717b
SHA1b8a50156a0ba3cd5499744bc536c20380e5c5520
SHA2564aea7bd3127ad089113b0cf44b102c1d1f10f681b3869d60e9024c6451ee224c
SHA5128a1afdc2e728af515d6063879d9634845a8a7133b086079a8408af50ba61bd67ae2ce216ed2bea6beb146132005f2996ce8a8f54de813b0876f52c42a08d77e9
-
Filesize
4KB
MD5c406a188145b454dc810b4b54bcbf5fa
SHA15293e42fcd66eca0b8936bbb5d7c58f39fb0c42a
SHA2562945cbb9bccc9a3e0b59b49f0af1172b1e5a9e359428095fade3f3a193179c69
SHA5124bdd429a75381f46e6210b8dcf40c61151a78d5e7a37157966d185388693bf7452ece20756ab4e0814959e9999cb7dc1f2a30702f6092f828c112d69182863f4
-
Filesize
1018B
MD5c48858d62f1cf43cc503aaaaf463d351
SHA1827789abbfeabeff872e836f8116b88ff61773b8
SHA256cbe56a0674573461dfdd2677d1ba4b5e77a016a8f5137d53c7e8076a82c8e0e6
SHA512281ae27c1b4c05c675ed7b144a8771bda292c6491972075404b77efc3ac9dddf9dab48288ea363dc28339927f53e742dff5806570154e32eacffa72e909f05b5
-
Filesize
2KB
MD528a7794c77cb2f9feed7323bb503dd48
SHA13e2b13ab01667e71a58c48318cf228994efef3c9
SHA2565cda462b3e658f0a1ed8730eee571082c21e6099ffc847fce731eeff53e12239
SHA512fb11abe0b12ef4560ffdb64ec42a6b99fd4c859cd5b8d07d05d8593b71650123105d3354e37252a01691a1b8f70a9b302f9d6ba54c62cd9004af968ed6500f7d
-
Filesize
6KB
MD5d30594494155fc0df1b1f8d0e719d12c
SHA142f7eb01fb2ad47456ca35d6691c3f401c5e4905
SHA2560095748712b86e4efea44854d9c57b961914101d90d21a1ac0d724cd115883b3
SHA512eccfd30db3217a2438cced75b4fc8fa52e724027e640ab45eaf53a7d14ab02da05f161cfda8b5f57f8669a521f2f33c9a6c81b07deb77fe41c8e4bc545961fd6
-
Filesize
6KB
MD5c4f257d9abd206e32ccbef31c6e1a8a0
SHA13b5c9550021cd8f55e339cf0be0c3774911e9ccd
SHA25638e1a6f2d918b881aa51fc34513cb7c081c6a473eff08a8fc26aa27e19abcda6
SHA5126787cb0127c2ef914a8583216be7eca1d9f111549459baa0092b4b65e8c17035e9e5a663682d42566069409033fd28c2b21a0b366030ecdf1306889c41198728
-
Filesize
6KB
MD5b4881257d8f6275d20e98985f4b030eb
SHA1db1e523c4a02ff9b8b23fdb3e4190e97822138d2
SHA2568e1cc7685db99f5d358caf7fa5f3d3ee5ccd087117126d340513d65684629348
SHA51229b6886542c3eb4009c463afd644583bb570d6b0ef0432af9390a2335cb3e6109f85af9d434d52b39fa53d9fdd6bb1b6223a9415b277137a2a56871958328686
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58823ac623ddb2f17c0c5143b27c8eb5e
SHA1dc77a43a3e02c0b222ce0c0edb33b9958d82d814
SHA256f752cb2b5b3e95e41dab5e1bb705e8e03919757045b2db3a3870bb3c4d09f342
SHA51248ca199ec26e3e51714433637fad5c33da44da2185a963e5dfc8cea651a90327a396486e4e8dedc7909ff251e59287ecb8a4e4777c97f6a66fbc43f512732c2a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d282.TMP
Filesize48B
MD5d29e71f24cf81c4c254cd2dd06ded253
SHA1ee2396ab68a8c9e4edd4a224c632e5ff5de646f3
SHA2569eaaf6a6edddd6a8b7fe41a397510efa9434419e132e943d7102eb6dd445a09b
SHA512014dc2a6b36142718a28ef2b520707ef4ef0035c95364f1b6c646e0b4d514362b2d11fd91b66c6259cb8029abc5a1fded2550198278b40393e6ad0b3e39db4ee
-
Filesize
136KB
MD5fdd0d4c1b3e9e787d4c7e622dbcc1d04
SHA10d80d248cda7eefaf0e323a1faef5b58a4614df4
SHA256bc8795e6756a0f5c038ec2f5f3210502c185b867fbc85e462896450a49b672f5
SHA5121577e13d0a8cab075fc14c2c027694b24cd64da9e12265df4b38a1ebc774599f8d715ca78690028c2f8847b9e58e4c8fe8c852a80a311cdb666dd7618aeede40
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd