Analysis
-
max time kernel
28s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 11:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fiveguard.net/start/bans.svg
Resource
win10v2004-20240508-en
General
-
Target
https://fiveguard.net/start/bans.svg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626646298973412" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3172 4160 chrome.exe 82 PID 4160 wrote to memory of 3172 4160 chrome.exe 82 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 4540 4160 chrome.exe 84 PID 4160 wrote to memory of 408 4160 chrome.exe 85 PID 4160 wrote to memory of 408 4160 chrome.exe 85 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86 PID 4160 wrote to memory of 4356 4160 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fiveguard.net/start/bans.svg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffe2ab58,0x7fffffe2ab68,0x7fffffe2ab782⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:22⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5096 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3108 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4136 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3240 --field-trial-handle=1924,i,2507314033844790107,763832709253722129,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5ebcd677c61d5d58e865f076724952bce
SHA14f2caf4a8b44a46ded8c6594117baf483d48158b
SHA25620136a77fc6ac43bcfb5a0dd1265b7f73bdb67f1e0998cffb7aae08fcc7e629c
SHA5126d935cd28be5bca7ea171b313ea0f193fc6e887cde276ad04de5d0c2c7db1528a2c2b924e7a79a75796d170b9792bae402be9a769d7537a092e59a4553b53352
-
Filesize
257KB
MD56e7835af9a4874613be84ee41edaefab
SHA1b91280e518748e6b995e6666bb4d91373e67884c
SHA256cfb2a7b3b1a53bbbda4be3267a4b71e4ff955616f8c0d34a378561b9d7152d62
SHA512651a330f68b6b129da1f36cb555d487ca660f2c707411b73195e1d04afdea66af32e62adec4ff0b2c799ae165d9cfc4a73676fbd76ef80f8581734c23613d76d
-
Filesize
257KB
MD5d76c89d22a3846d5b117995e77640d3d
SHA1ed037650006cc0351fd65105a999efd808744c2d
SHA2562cb395d30a5411e789c7a732698beae6afc23a4398b3ab31720e8966f9b9a5af
SHA5122301c16cd66156a2bb99c67e81484dfae419daed25046c518923512d7aee499b65f4f97201ae9653f3e498ddc16e8c9fe3a02273a5a393497e72b37731b5a4ab