Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 06:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://acrobatesfiles.top/8871f263c8499e9ffde69c29c3271c9f665940884029cLOG8871f263c8499e9ffde69c29c3271c9f665940884029d
Resource
win10v2004-20240426-en
General
-
Target
https://acrobatesfiles.top/8871f263c8499e9ffde69c29c3271c9f665940884029cLOG8871f263c8499e9ffde69c29c3271c9f665940884029d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133616101050697015" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4504 5104 chrome.exe 82 PID 5104 wrote to memory of 4504 5104 chrome.exe 82 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 2972 5104 chrome.exe 83 PID 5104 wrote to memory of 3388 5104 chrome.exe 84 PID 5104 wrote to memory of 3388 5104 chrome.exe 84 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85 PID 5104 wrote to memory of 712 5104 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://acrobatesfiles.top/8871f263c8499e9ffde69c29c3271c9f665940884029cLOG8871f263c8499e9ffde69c29c3271c9f665940884029d1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb42beab58,0x7ffb42beab68,0x7ffb42beab782⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:22⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4192 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3060 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4400 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4680 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1904,i,2398300331195976374,14344135906335563379,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD55e03610dfee2ee2895c00abef856137a
SHA16d2013a2bb0097a3d8bdac0ce9b49b04325eb0bd
SHA2564dc12492170f461b287379dbbb6b946f298ada88419599ad2024674f05f6a2de
SHA512fb4376a5bd5c08fb87a3b0efaff7aa4bd74e486cb0baa79555bf5d67990122c6d3835030460cdbaf94c9d3bda5058f5e360f927b6f19d20370c0343fffe2868a
-
Filesize
1KB
MD53304c4f8973d8ac3dbe3be1732eb8628
SHA1cd5dd5028c16081ad431a6fc595aee9bdfe93a4b
SHA256658f889aa405e8be6ad24a573c28af316cab41fe601270307ce3a80767e613ea
SHA51284e39ad8a6dcca8602c92d7875c9bd41a88b97d053a1664a9e39a5064234ad1e3f04a61e4a92376842f5c42359b14a5ed059475fcf33722ce617288c6e78e35b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c5edecb2aeaff434b9fb736d086a1419
SHA178a39d5f51c22a77cb4b87383dcef616bb4095bb
SHA2563bed02caea49aacc0c7ce614c8d8522119d685ec09fa7ad04edfd87d01747615
SHA51299f60d9d5c16547d544a0b732e0c89284ab9305bd48678b25e4ae6f8c0b524d6d59a69e9c6353a42f6276c362909bc9908e9d222f57675756944eae5641fd15a
-
Filesize
130KB
MD56d7cdc3b949976b5d16be73e74c64cee
SHA1474891790d43607fc8a976c3209f3230bee010f7
SHA256ab4feb437a2f20ae11abb4ed0a67cf732ab1121cf3db69c3da1f59f9d8d3b3ca
SHA51277fe223ff940fbf5834911d52896a85258bb39d795d4ec7322613294db0f46444b538a8c77dddd57ce3203b32cf4fcce1e381e4e4eddbebfc36a9a9860287831