Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lolz.live/proxy.php?link=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F13fERtmN7XAyMv-V1UJovy1JuH58D6w_p%2Fview%3Fusp%3Ddrive_link&hash=cda654e9677bb9605a1fd2a2f2ac4ac4
Resource
win10v2004-20240508-en
General
-
Target
https://lolz.live/proxy.php?link=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F13fERtmN7XAyMv-V1UJovy1JuH58D6w_p%2Fview%3Fusp%3Ddrive_link&hash=cda654e9677bb9605a1fd2a2f2ac4ac4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625980559821293" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4564 3156 chrome.exe 81 PID 3156 wrote to memory of 4564 3156 chrome.exe 81 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 4600 3156 chrome.exe 82 PID 3156 wrote to memory of 1512 3156 chrome.exe 83 PID 3156 wrote to memory of 1512 3156 chrome.exe 83 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84 PID 3156 wrote to memory of 3172 3156 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lolz.live/proxy.php?link=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F13fERtmN7XAyMv-V1UJovy1JuH58D6w_p%2Fview%3Fusp%3Ddrive_link&hash=cda654e9677bb9605a1fd2a2f2ac4ac41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7cab58,0x7ffd6b7cab68,0x7ffd6b7cab782⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:22⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2304 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4664 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4800 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4972 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5156 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4636 --field-trial-handle=1928,i,255717564473485175,5868949105893054719,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5a7586c90f5fc833ae8cc856af154d1cd
SHA164fd9493d7a633245dc77aea2ba9414c2ec250c1
SHA2565b2d25bed56cf7504e8a86af10c6f75ddc866ab3a0c23a2bbf6958f669330920
SHA51232efa1b470e85b6e5c30652c3ceff2ad5bd83482cd1b774cd10168f3aaf068f700d1850988a88fc057ddd7cfa3c6461527a1694545e00007dea044c0a78b20a5
-
Filesize
257KB
MD5e06039dde2024ba973e54b30fd3674e7
SHA1f67d5c7b1ee46390fbaee7fe21016342e2ba3cdf
SHA256181ce137efc31b0591c59b2082bc1bb7de53e813df0be5cb2677736e73776986
SHA512dd3fcac73b72eaa2568c9388f70e0a21554851016114b3998cab2f4ced90e1b07f9aded3268adf3fac295ce3c5ffba81e7c412f08f72fc22b2983614ba662a7c
-
Filesize
257KB
MD5aa14f87b00b7056ae4342664b81df8b5
SHA12bb3257672658914876e19787574eb3b8fe63977
SHA256e502b879160a57a2760678852f2259797022efc969cf6d179487e45137002894
SHA51226ba7fa0032b7f053bcffd18424ed8df2ec58f4c2a8ca8818c4bf9f392ab13e0c62fae0cc1f1bb0fc133ea92c833264f27b5072465bfd8f14167f09b0f699964
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e