Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 01:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://time.nist.gov
Resource
win10v2004-20240226-en
General
-
Target
http://time.nist.gov
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133622836573496920" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 4724 chrome.exe 4724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4416 1572 chrome.exe 91 PID 1572 wrote to memory of 4416 1572 chrome.exe 91 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 4740 1572 chrome.exe 93 PID 1572 wrote to memory of 1612 1572 chrome.exe 94 PID 1572 wrote to memory of 1612 1572 chrome.exe 94 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95 PID 1572 wrote to memory of 4208 1572 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://time.nist.gov1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e6e39758,0x7ff9e6e39768,0x7ff9e6e397782⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:22⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4476 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4428 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4636 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3024 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4544 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=216 --field-trial-handle=1864,i,17450607246069098629,8800263400589709142,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5217fecd4ffeabae727b45f7be007a713
SHA1c327fae5914b2e6695f0b76ea65672ef0f40ef35
SHA256e0ab0bcf4648aaa7bbda6afe5265ccf3b694885d74b47526901680477436e56f
SHA512e3f5c493bfa1662210324fbf46dcf9b925cfd67f0bafd676ae031a4d79d15fda7414278c17bb563cdd45cce85ea6e9e9770060560e99d7c62b4955b2dfdc1fa0
-
Filesize
5KB
MD5dac41660d5a86455854b97dbc17710e1
SHA1d87e05e0360e0cc60c9dddf4067863d0880b00dc
SHA256fb5c7087dbab8026095dcdc48737be65c682fc066f0ee681ab25395b35592186
SHA51283ad658a4111ed8a96af4424a8c8cb3297bac9ba41eb1e035a13eb96a1b60a091c4f43da373203dda232b198e667634cf1cf8daf79b228d348463caa33e38e09
-
Filesize
5KB
MD5ffd55ae0a53e49f0a904d2102691286b
SHA10df0c0dd3258ad9392f43500bc0de793b1b2e540
SHA256c745557a9fc3da8d5a0380d792ec73d6db33fe0bc665df0debfd6bbc2c4480de
SHA5125b45b64dad485ce5027da6390d6819791c9e00ee85c5ab804049435f4ffd12454d8630d59e588dc8963a747fd10148df75af2323ef67a191c058430939568437
-
Filesize
5KB
MD5ee48cf093ab23d85fcc3b3e2b3a71a5d
SHA1fb5eca8b08cabc644f1ae7eb9f437aa503431c6b
SHA256566836253e7ae14e9aee3e41559e885bfab65698dcc840831235bdfdcdea5b36
SHA5126f0d45bf287214d2f1fd58bdf7d119e0a548f9057ac3a3be75c0f2c1a066ecd553015cc89bf149e64a8e81c764b9e0d7f0785e94083b64ba4d345185b056e5b0
-
Filesize
128KB
MD537cbebe529a741f46b635a4c96b45fa7
SHA16c1e1548b5749579e8d7b8b7adfccd69409930c3
SHA25618d4491e9c82c77d2fdadc65ae6101fca61304d4370e1af2ec4419d3e145dca4
SHA5122fba6c1fdbacbdd0bea879c79330da3359ad5d64b997417cd1b94e5f2d40069039d1a08b4fa9d54dc4da668db45ab91d0f5dad8545801ab65b8012e17d0f9411
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd