Analysis
-
max time kernel
87s -
max time network
82s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-06-2024 11:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/1-W4IA
Resource
win11-20240508-en
General
-
Target
https://u.to/1-W4IA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620615180501581" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 468 chrome.exe 468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 468 wrote to memory of 432 468 chrome.exe chrome.exe PID 468 wrote to memory of 432 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2904 468 chrome.exe chrome.exe PID 468 wrote to memory of 2456 468 chrome.exe chrome.exe PID 468 wrote to memory of 2456 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe PID 468 wrote to memory of 1116 468 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u.to/1-W4IA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcc6daab58,0x7ffcc6daab68,0x7ffcc6daab782⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:22⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4188 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1456 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4732 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1828,i,10405067097749052667,7030078452199804769,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD51a8c72c6fb9a993c98639bdf02cde307
SHA10063f3af20738627357f666887be7acd58f0f121
SHA2564407eafddc5a78d0bd1ef9ae9233e18b4788c986eee2ec4d8a407a69edcc326e
SHA512fc875e8f42664621cd922ed349d397e8e72c0e8f26fe07bd4317ecfda6a503393de13aee1f878c23b0061cf2f2a7811261b625c70a5b6c4c9ef8825f92e9703c
-
Filesize
696B
MD5b598a136ac35d0c233dcefa5c5a395f1
SHA16ba8c566defc7de0c4cbfd778989d27e2b1ce4e9
SHA256983e908848efa5537c76249030e5179a29e9700779fd61226ad264ccd87b5910
SHA512edafd935d13cf526f90be6129ec6947e2409c2225b07292653c26af45b1846511f3c29af72d25a5744b06fbbcf4903b4010fe3a7d0145401241f20fc911bff89
-
Filesize
2KB
MD52f00e00626f491e5b5e7326aefc57d79
SHA1b0f7b019445d6f59f91e3dc83a584afa7bacbbe7
SHA2565482c8aa2ab16dcf2cc1cd4b3e58b6aff63695619370c24d320852fa579a37f4
SHA512041100c3ccdb9711c15d2c0595fa2e0e16ee7e3d86fea72af443da69055ed8596f8c3d54aa2c075eb17a901a3e99fb478c1fd1156e2014ae0d044254dd1a0d38
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f7cb3c7588fa5cae03a2a5a07294381d
SHA1372ee836e36420f8466713b6e6aa0fd35b872ba0
SHA256f22a1a981a56c2b0f622f811511a1d72d0452f906d9aa6e216af0d0f11e7428a
SHA512d1c01a1550e3ff48faabc148ecdfebed526ce2e89f385e03319b0add28d1c950106dc166dae5699591d872b37af862484d6455c8586c7caba69504d16d56cafc
-
Filesize
7KB
MD5d9e0a91319c1df892a6d1c44f7b0165a
SHA1656b5ef35a5592d2818ef652383205e734fcd615
SHA256dd3ab5f10ee3e65f44e06aa6ecb96241455ff14bd947a7352ce29d785f1d56e0
SHA5124c6de0e58b894a616ff9b385c7e184c34ed6092e458cd912e99589d05e2756500fcbc5f6d7577c81b2ec6f83f7665ef56986ff34f43392e219ad0998cffa3f8b
-
Filesize
7KB
MD56966644ce54e65ef59800c7c4143d0c5
SHA16f412c0582b53c4e3d96b4abace5e30415c131f7
SHA256e37294796bdf08bb00076e20e04969de5afe030a9280370988ca9ef5b4cae7c7
SHA512433ace36236c02fd1afa79656aff641ace8f3c52ceb6ae8e7e1a1d9c2ec467ccb2a675e2514d8252700d61d5629cb67e218d60db8b8c5f454ad0b75f6fc35d74
-
Filesize
10KB
MD5336b07ea4d3d3e41120b9c79dedd6649
SHA1aa7da86f7e06a2b8c9dee8e25c8b9177ee801ef3
SHA25682a7eb6dcb42b5c16881ec52c9b21b8ad476b26b7ef5eed1d0adf5e66b2724a4
SHA512b2dd33eb5bcb51c2aa02beb8ec678dd100c7dc39d31dcd18a22d2f61f8b624536a1f53ad9cbd03651f29a6143000e3af0076f8bdd03cd2423a44a4ea2f8b059f
-
Filesize
129KB
MD567496f57a37e79262ac07ddefa817388
SHA19409afbe29993ee717cc0853c3f7dcd8a0cb3f13
SHA256fe8a17fc96097fb60530d2425619a56ad1ed5e9cd8e6b0f79f4d4ceff120bead
SHA51215818105b2a78e90415026584bf383c7ff1e6b19e31f0657fcc7bc42cc246e17c6eee95e59d3e244cd1e730313db5e585c061b8e15a917e7d6f8ee12fe26d146
-
Filesize
84KB
MD5615cbe28e53b1b2688ce8035f1a66b41
SHA135b292973f25102b9cf35444c67e24e3b4e8a590
SHA2563519899996367659e94561e1dded2e089373543beb081e53c6ba1dd1e3ef4413
SHA512ea3879951f792b049cb4114f9d83828d980492391021af4a64ecfa351d5bf37bbf0c0e0b498e7375958df5fdc689b032cc464b2006e462b08a5b0c4e8b9d1fbd
-
Filesize
83KB
MD5e2516480cb86a045006524939ad7b8ef
SHA1771dd684b9d04d214ad5330b15dbfd9767c8c39f
SHA256ea3829c767113248af6216f358062fb73a42c0df2c07da3886976db98fffe3da
SHA5123f7ee158c79a5f6d7604c423c45050d2e4ef84045dd13922dfa342c5f5840a5c926b9c74c4f8baad448fad127796ebb809c11ba3976cb9e6f44404180b950225
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e