Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 14:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dizg.cgraialp.com/cBmG35/
Resource
win10v2004-20240508-en
General
-
Target
https://dizg.cgraialp.com/cBmG35/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133621570140088490" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4816 4852 chrome.exe 84 PID 4852 wrote to memory of 4816 4852 chrome.exe 84 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4888 4852 chrome.exe 85 PID 4852 wrote to memory of 4600 4852 chrome.exe 86 PID 4852 wrote to memory of 4600 4852 chrome.exe 86 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87 PID 4852 wrote to memory of 1192 4852 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dizg.cgraialp.com/cBmG35/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40eab58,0x7ff8f40eab68,0x7ff8f40eab782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:22⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4496 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5060 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4000 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=944 --field-trial-handle=1824,i,12760647337802730204,10758835107001472529,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD51f821cfefd2bf74cf60a4e5bd315a997
SHA1e754d788e3dbdaaa7a1e9d4a0aafd221018ad9df
SHA256f05d053dcd0494c144d78ff01dc022cd94421141e23f24c8a20d7a8338d2591e
SHA51268ba2f52e21e30f529a9ac1dc795fc568f2a84ccc3683cd8ce2f69f06194ebae2aee04a11da3396ad6ac80e1489932cd6824a3a301a5d5004c0c78d4a8af4f1c
-
Filesize
2KB
MD5bb84b75e2265b32b9dec5f1bc16b9e63
SHA17bab0f9fd5af4f336e92c73418ce0a5c8196767c
SHA256131e6796b33d8e8fa776771f5b3aca17159718d88f26cc5d35903dfcd0e815a6
SHA51229acf5eadf6b0989b05a397173a6ead216c7c3f497ca1c5200a81d7050795371f1e5dc4c358f487aa2eb41e990f8a2e306a23211cccf030325fe30fac675471f
-
Filesize
1KB
MD569fa054b668265a142ce858f8c36c73f
SHA131c84ac78c675a79d73619a764210a72bb6b1e6d
SHA256885ca297860473cf8a2846086aed720617c153528d283217d29cc103e8fe77ce
SHA51241b10fbe789bee84a3e97948918e83f720179e345c91ce15783601065bc9e3262913bd26dded0aa07881024e929b4b4c5f20d000d917ff9dfcb93f095aaff22d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5fe1385c21d1d68c14855f7da886f7e05
SHA16f93eb893e85aea8ba89d1e48209bde28179f574
SHA25657781881b0b4b76b6bcdae8282750742b72195ca45b18825c6cc281abdeed052
SHA5125bd713e5fd33b49039567c45556e4811ed69385f339da5e6db9bd15d5f2cb7adb87622d77e0c5349b28fec98604403c915c71befaf2758460af9e20f5c36f9f0
-
Filesize
255KB
MD58636fa59ad560588523e33282bd9d654
SHA1d7a5a7a1df1c4e0bd1fc29f21bbb3e5f0d84178e
SHA256d10723bd1ab7a3644061948d8e8f33de2ec6c13d87b3eb137583ff6aa03179a1
SHA512c3d03d1599f913799e5c59d9af464e67a5541591002cef95d425b64209a3c5548f34b15607357d7c45fd71a545bc00429b13fe050777f98becc422e7f63e06b2
-
Filesize
91KB
MD54b85a88b475d9abdf3115d5773f9f2b0
SHA1e95a0a08be9494544cbfc34f03fecc8ffafedfe6
SHA2567bd2b9c001b5093e5960c1aa2333a9ecd3cfc712e08b0a97799bfe66aa14d5fe
SHA512a1eccca890dd3d01b3a40524c0e3e1e2d924097dd863dcd7f66f1de30f2f5c07507b3c8c42ca90945b93632bbba80f5db6b57b6a20fa04e9361f35119d60368a
-
Filesize
88KB
MD51ebbae8a7ebffab1d0a22760e820221d
SHA1598f18a98d4e1405aacaca6f542af7976865c9f0
SHA2569fe9560e72a58d8a788cdda283a7a74175934b07beeedb4c34ff616bf5abfa0d
SHA512f25adf3eaa4832148a59bb51605a07397bfdf3b3b7c7249b97d2da22be09ba9f16fe1935d9db1346eec1622b4f0f3b4511fd52c3dbf2965f071c73f1a2b1aa61