Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 08:03
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625666590979380" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 1860 chrome.exe 1860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4080 4888 chrome.exe 80 PID 4888 wrote to memory of 4080 4888 chrome.exe 80 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4528 4888 chrome.exe 82 PID 4888 wrote to memory of 4996 4888 chrome.exe 83 PID 4888 wrote to memory of 4996 4888 chrome.exe 83 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84 PID 4888 wrote to memory of 2580 4888 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://account.microsoft.com/activity1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec8ab58,0x7ffa1ec8ab68,0x7ffa1ec8ab782⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:22⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4004 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4472 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1880,i,10049283656205194249,1898548225656368519,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5054cbd8db3a9de76309d003c645b20bd
SHA1acf09b472c5e64e39b143adf9d40454ba832a663
SHA2564a1bd2ce9d579f3ba310b63d4f2909b14155ae65bacf65804d7b744ea24be1ce
SHA5123a7144924c53c91d4ac3cd24d8b187037cbc59442ef45b0480da9777c7ba7ceebf16efc249f7aae3a5e208c0976f092d071be37d188504f4379bd78b43585c3a
-
Filesize
1KB
MD5fc1f756a7a6a29d71357ff7a2d646336
SHA14432f09f401d8f226fa099727fa92d90d71c5e10
SHA25635e2da25210e94b4fe6d5e0d4517fc9db8922b12c3aad56d843713a0d8263bf2
SHA512f134961dcfaa6d13e2f611a8d2cdeed77faa8727bd84b107d2b4e578e8ab09fac2820fc40913c8afbbf15ea5a900b2d8e208e9472dcdc8f009d324ac549130ee
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD559eca666f0a31b08f0276ffa3fd7d49f
SHA16a8e1b12906c201cf4f29989f0ba58a351a54f79
SHA256ddbdbeff044ca1b6cfed3ed8125e75bc4e9e6d2496513e730f47281ec9afce96
SHA51202bbc43e7340657ff77b69b9115e90bfb2716e74b5c7d2ba4d864876a46055d240c37d78539943ee8c9f890599116ae2da213288d8e5c61d2c1727db449b083a
-
Filesize
7KB
MD53c601a7525539b6e61f7f14301b3daf5
SHA1509c698f2398af3cd9432d0f6cf3fed825ba58f0
SHA2565c843adce2412c69dfbdffe5b1fc7bba273912725bc28b1ac08ee9f695ec5a2f
SHA5120f234be9d40e52d3a843643af9f148d2df97062b43518f260baef55cdb2da04bde189815977ebd76abcc58efa3a48b6df49e764bd8d475849f9adfca1ffa5c90
-
Filesize
130KB
MD55cb496a7083bc67ec292ef889825fd76
SHA1bb1dea490210b49259018d059f2c82cd7dc684f3
SHA256041d04ef3c402cd95562709157da39789b1ed2e2f8c00a062b74db9ccca7a97c
SHA51207f34cf7a96218aae5becc26f3ec34b288256a6386a9dee593807e383179dda358cbf477ce6d3f051030c9ba6c0dccd7fe6ea182ccf2dbe5a4f36be49178ae78