Analysis
-
max time kernel
599s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 09:31
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-ea9ff8822fce442795fcbf33f70ee6fe.r2.dev/ages.html#[email protected]
Resource
win10v2004-20240508-en
General
-
Target
https://pub-ea9ff8822fce442795fcbf33f70ee6fe.r2.dev/ages.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636951023534127" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1472 chrome.exe 1472 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1472 chrome.exe 1472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1472 wrote to memory of 1092 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1092 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 3380 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 4364 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 4364 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe PID 1472 wrote to memory of 1972 1472 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-ea9ff8822fce442795fcbf33f70ee6fe.r2.dev/ages.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb7edab58,0x7ffcb7edab68,0x7ffcb7edab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 --field-trial-handle=1728,i,4496896248541293244,8568849404150921862,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4124,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1040,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD5426d39cae8994b93ad3d5637ab2ab958
SHA14b721b3efc121ec5754981da839cf340c4da9957
SHA256229bf6e6e97a81342b42a084d8250ffbcd3c6041594a6b24457ea6e17920f21f
SHA512f832fd04393410e5c08bcb7a40181b14348c0fc02a83bb4ff753e4d3d1cda768d57c123c5f0b2dc757d4b3061d2ed1419fe31b32a255c7d39ebf989ef03c3fd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5e45ca6c670e96079bdf1a6bb9c59b882
SHA1b996551383cc7937811b17d4fca7946418825fd0
SHA2567acc15d02f3a52cf6653828d1f4f7965ee43f44b1405760b5df2e4b0fbe82443
SHA512e4f41e47562a43f2fc932313c3ce51371e7a62d9fc14345f4d97dec1357f703bceb862c3b8edcda935c1f298f6aef1d862f96ad267e2501b8c67bb5ffbb6874f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
857B
MD54ab05a6d0890f6c5d6a504589e05b36c
SHA141bbcb53b3456a5b3c33f75c194c4427e950e5f7
SHA256ee978973068b1250b2b7fd8a37a1eefd5dbad3b7ebc032d6d44449c1e593201c
SHA5121efed6026bfd132ec3a72761719235038461cb7c0fb4165aa278ce155853f2cbf868e11baf070d127f498d9fe5fe2d56fc33a4e6062e74b3148a6b65e128c7cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5bf74737b950c02e38de38474924b8bb9
SHA1cc07581fe78267e06cdb188af50b33b1f9a0402c
SHA2567874abc027e0cd7a72869d841de654f9a90986333c63d9a5894cfbacdb3bd125
SHA51252dd86fc427989d9d37e9db31024213a03d0042e3e12ab84470da1d041a831cee5959ae640b37ea1b0b2c20d24e3ddf9dda6cb6020e312708e6e4586eb2096ce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD5a70f31f7a763705f32eec83c8e453450
SHA1f4a625f87ed8339226e4f8d6de037a4137014a1b
SHA2560409c728806067b7ac68ef178646cbec6d0b4d7d7c5e8d9a3fce4441467148f0
SHA5122f3e0dbfe5870c40c7e557c48036f6f2d6b023daa784cd192a35fed83235207106dc57793a50b5b0d75a0cb552cdbd579d99969749ade56589892d2e1d5afc02
-
\??\pipe\crashpad_1472_IPTASJWHUHOGIXXAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e