Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 22:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sendspace.com/pro/dl/3f50o4
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://www.sendspace.com/pro/dl/3f50o4
Resource
win11-20240508-en
General
-
Target
https://www.sendspace.com/pro/dl/3f50o4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626173349137833" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 1236 chrome.exe 1236 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 232 3680 chrome.exe 91 PID 3680 wrote to memory of 232 3680 chrome.exe 91 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2084 3680 chrome.exe 93 PID 3680 wrote to memory of 2468 3680 chrome.exe 94 PID 3680 wrote to memory of 2468 3680 chrome.exe 94 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95 PID 3680 wrote to memory of 2884 3680 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.sendspace.com/pro/dl/3f50o41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9496eab58,0x7ff9496eab68,0x7ff9496eab782⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4576 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4564 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4752 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2676 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2920 --field-trial-handle=1988,i,15947393541303679086,622929375151827595,131072 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4264 /prefetch:81⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5148545bf5fc5aee6c9cec78fb7a4c5e1
SHA1c0a087bcda4a647669c307b43d74a71acfe1d6c8
SHA256e06226b5b1387514bbdcf749d7a0dd0dd463b701845b819f4dd079ce5225869f
SHA512b3ede22975023a4e455fbc1f473f39eef5407c56a1bdff005b086448390fafaaeb9506a0a019f755702dc38f01b414759c1904142eedf398faab939b6b509c1f
-
Filesize
7KB
MD534320d0b957bd9cecee0dfe033b78059
SHA173eb25d4b4c6df6988a774836e7af009ba8eef6b
SHA256ab19147e19c13f54ca1cac6d99dc7c650e2dc3f2a724df4609d42e40c4ce306a
SHA51239e9b559ea2d293d9f526ba722ab76757ef6003c64472131540539149eeda754960efa9989dc3bbba0db555d5fa94c60286896f3c9432e947a54dac5927a0beb
-
Filesize
255KB
MD52a67d67c29b3dab061f3005ef811343a
SHA161816131c786a1dced2cfd01579e12797c6c3d22
SHA256bb1f1d96e58406f5f2a156db6eb4f200d56a9d32b9e946b76fd84c131b8ba8d1
SHA512a15053f8dfdf3b236b15cce2c312fc1e6ae49a860f6904b3d65c9bc15065c29bbdaf22ea850215732465b740b987d771bc2b0de7c303e7d5f8128e632c6eb342