Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 13:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.facebook.com/profile.php?id=61552442676384
Resource
win10v2004-20240426-en
General
-
Target
https://www.facebook.com/profile.php?id=61552442676384
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133624997784821184" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3568 chrome.exe 3568 chrome.exe 2172 chrome.exe 2172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 3744 3568 chrome.exe 81 PID 3568 wrote to memory of 3744 3568 chrome.exe 81 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 3232 3568 chrome.exe 83 PID 3568 wrote to memory of 4000 3568 chrome.exe 84 PID 3568 wrote to memory of 4000 3568 chrome.exe 84 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85 PID 3568 wrote to memory of 2500 3568 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.facebook.com/profile.php?id=615524426763841⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7302ab58,0x7ffe7302ab68,0x7ffe7302ab782⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:22⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2824 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3928 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1904,i,11321498398232343857,9276606971192946016,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5112acdefa3c5287631c1aefb93790868
SHA135f205b97ce33713a7937ef640cbce7f1b76c75b
SHA256ee9d60ffe8ef39a0c4623842e903746b5eca5aadd5aeb896d02bdf033d536d33
SHA5125a0c1801e2e3d3093620a280a441368b1a43fe739dec2b64b4e8520993165b0df6dfe0c151fffe6848c2c459c11a69dfb3abe8ef7839442fdeb92e80726a9b10
-
Filesize
2KB
MD59f35d47fa3a59fbfa397b79e7e4b10ef
SHA149ab29bd100a2d382c408de67a8040b84f99d342
SHA256e849c15de53bd99c9d40e7c936d9acebed92ce39f4c6106ed380fcb63ae6ddde
SHA512c7df29df11286a97418cf3e6ef2a265255c27f69e69c376f2836615dd37a112fc7756442c96ebf2375e76f2fbd23747f85bad9767324e2e948b72a3d4342a538
-
Filesize
2KB
MD520ab8a8a27a199947413ab4453624b1e
SHA16497cb587c354e6293b9f4fadf48284506cd6857
SHA2568a7896ba13e0916ce2290b45fc34a8fcdd807b1d1f232457fb788ae985937f34
SHA512084fc2f890688c682f9e84df762f272b9ae2386c73ba9c15ac83ac152735704d71775be4d83c83edf248e2e0df4df0c097dd4aba51d01ab1a439c256f95e5aa8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD51cfa9ce0a48be43b0dccfb9e1f525d0d
SHA16e8878198653fb74e4e03ccea007ad25813cd9ce
SHA256303c924005ec30e87045bbd0cb1d549ef8777bbd5e19ccca54fa9d8506512051
SHA512df96cea718c5784f5fefc2bd503f52183eb9408a281071725a95d6adc4e3386cb0c93e16f3c00fa7c5e95622221449dd9ea6fba6d9d146e068ae8f2cf7f04319
-
Filesize
524B
MD5ad7111dff6b332b0544b3703dd3ebf7b
SHA1bee7b80fad4e5d9bd13ec876c51501ad3bd4cce5
SHA256f25424a982e0c11117b35943f0d32b1461aacb0f46dabe78e0b5e2e08220cb0a
SHA512a30e5e93e4cd0731fcababca6450b0a2102af2a1802a60a08dc1c17b97298395aed55dea318841911f56f9538748327d552a522dfcac7af01e18f50b347cf96b
-
Filesize
524B
MD5f91fd125d293e66447ea555ad7e7398a
SHA14eeb48986c42a2d13120a53adb9ec7fe10e5fcc2
SHA256848361c21a41ac9669b0fd5f7be3a5cbaffe16cdb44052bd3c971037f915447b
SHA51259958e80ac73ed58130ef17a782723af10e2582d4f7b46541a9de7db331ad3a79e0c7a0e8f9a77fedfc9b7200799d7ff2c0fea686d9cb10e8fbd75578b52b0f5
-
Filesize
524B
MD5e3fd740c7ea3035c2b18b0bb9ac0fa39
SHA1eb94d6425c1239a2804b1e7838a620607f1d9923
SHA256d0e03b847798b7ffd3d6439c65f77b936231d7cf790887c626966240d57aeb1f
SHA512024a43970ab52363c5709b885ba9f2b071c2f34789b84f2f5101fb82ceaab9352b96ddbd5c11b1af1dee060269a215a6032f528638ae81a0acec2323b6e51895
-
Filesize
524B
MD5897787e7c077225184ef52a656f6000e
SHA10e9e4f4a2f79028eb00addc3d90653303f514433
SHA256a30a1fe5dc6ff367f1d49a20f9812bc0124cff672414d4060d5f10918aacd634
SHA512c707930d2b1f72cdd3100724e4376f0447f0b256d91a1e6d3103bf76ec0b3d7f571615938896bcf4df4cea77376c29c4b6deec8ad7cdbb32229e6c3fb068db30
-
Filesize
524B
MD5981f403293ce8136750c805494198eaa
SHA10462738bf1447cd392842f0758234662d5477bae
SHA256f1fa87abf754bf82f31706b0c5bb31de60018b43e76bfb23ab5c2f6639b1e22d
SHA51270c368b3ee9eb2c89000977b742fdd2b9ee34abf6378795b77cbabeef4849edb5116b6427eb50132cd904acdbeb7db8f2b74578b618d3ab32ca67ad87fe823f5
-
Filesize
7KB
MD5a8472bfe3fecce21f37bc4ffe6409ea7
SHA16f021a03a22b73782b5ff5becfe356ece3846034
SHA256484b510dd5689c536c57f1f72d83bb53d91506d1816b6b8e220e81c524daf9dc
SHA512c20ad6ce9befa2287b8e39c188d87508825c4ec225b6b70b1144a27ccdf0cae9f76ea77ce29a5ab40818bed4d0aa99765b491368eb3360f1c3aba89f089f7d7c
-
Filesize
130KB
MD5b27c76b8db81790d6754242054644f0f
SHA18627463eabd0569f2670cf80ba0d3dccc0616d16
SHA2560bdd96fcb6c0b7c798d8c108305e175917ba36e2bcfb139b13b3a3f7f92258f9
SHA5127cd2cc666e6a601a2e37cd793824f634cbdd7ff581e15079c4e0d9054eaf000f971b4ca4d8360e2c736e0edc135f09618291df335f04c9efcc48bf30fa6e2fdf