Analysis
-
max time kernel
27s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 19:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://assetmanager.intel.com/
Resource
win10v2004-20240508-en
General
-
Target
http://assetmanager.intel.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637301225293976" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1844 2168 chrome.exe 81 PID 2168 wrote to memory of 1844 2168 chrome.exe 81 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 2380 2168 chrome.exe 82 PID 2168 wrote to memory of 1904 2168 chrome.exe 83 PID 2168 wrote to memory of 1904 2168 chrome.exe 83 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84 PID 2168 wrote to memory of 4972 2168 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://assetmanager.intel.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa9499ab58,0x7ffa9499ab68,0x7ffa9499ab782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4152 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4072 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1848,i,13640817351008492253,14958312334828427535,131072 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD54427e5b875cc77e39c4db628ed0ea63b
SHA110cccb222e5e6140ece0b9a6e0b5bc234b69f75b
SHA25611b7f29866a110400de830e4669c93281b0d2e1f5807d96849fdfa2cb93da376
SHA512d38ab2cfcb3305a3284c67468befbfa29bfe2fa34e053fb7596c313adc7775cf5bc4c558279f861c11c0a6db250f4640eb461f213f1a2e329a5a1a11acc9075d
-
Filesize
7KB
MD5ea86774ad7179309ed5bdf849d741bff
SHA14998a0a12f55ccfa78abfb16d34ac9ebad519d32
SHA2561efd5b0366486973c5bbe08f6b9e26788a72972651bf48f9333f96533fc86256
SHA512a5c00315306358afbd9c8652c7ff6bce430d35b9bc00bb103f0014d5221dc14a3392e91354713bc2a9f05aea6e9d29eaaefe524896a5f49477ceba4b8ae22de0
-
Filesize
129KB
MD557c1c05941daac2b8418651d0dd8cdda
SHA16f0bd81d3dccbd80549e20006e1684ec57ebf0aa
SHA256a49e26ddff88b9a8fe80ae74aa4749277aade2f193abee62236e19b887c3c6de
SHA5124e0333f0b70fd3574cdec1553a088908c318706cf5db1b69526198a2f2048fb1baba3bcbf61a437d6cb61846b9c5cf60eed3e930645ff444b18f92858160cfac