Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 17:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qwiklabs-gcp-00-90d002c5a9ff.firebaseapp.com/__/auth/action?mode=resetPassword&oobCode=E-uUKnVC5yNMWwEUr1RxfCHM0iOIfKgJEgOh-UEygk8AAAGQQHtJuA&apiKey=AIzaSyDfhvh1TlmS9dRi4cT9A8XnsB83l4XwIog&lang=en
Resource
win10v2004-20240508-en
General
-
Target
https://qwiklabs-gcp-00-90d002c5a9ff.firebaseapp.com/__/auth/action?mode=resetPassword&oobCode=E-uUKnVC5yNMWwEUr1RxfCHM0iOIfKgJEgOh-UEygk8AAAGQQHtJuA&apiKey=AIzaSyDfhvh1TlmS9dRi4cT9A8XnsB83l4XwIog&lang=en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638091718155514" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 964 chrome.exe 964 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 964 chrome.exe 964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 4564 964 chrome.exe 80 PID 964 wrote to memory of 4564 964 chrome.exe 80 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 856 964 chrome.exe 81 PID 964 wrote to memory of 2800 964 chrome.exe 82 PID 964 wrote to memory of 2800 964 chrome.exe 82 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83 PID 964 wrote to memory of 532 964 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qwiklabs-gcp-00-90d002c5a9ff.firebaseapp.com/__/auth/action?mode=resetPassword&oobCode=E-uUKnVC5yNMWwEUr1RxfCHM0iOIfKgJEgOh-UEygk8AAAGQQHtJuA&apiKey=AIzaSyDfhvh1TlmS9dRi4cT9A8XnsB83l4XwIog&lang=en1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa54feab58,0x7ffa54feab68,0x7ffa54feab782⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:22⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2424 --field-trial-handle=1900,i,13945515437503059852,9585360519690671126,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5349a2b65f5d6e243588ee49f5147279f
SHA1aaff17b20edadf79a89528b2eaa2c74eb372234f
SHA256b438e29f7e11530b5550269b9ad8829448ae9265aa6a7a09b2ed6ef2d75e6e26
SHA51245dc5cfa8c22813fe013ccdb44d737fc0bdbb14e71b2f2d6a3a35ade663c123d572c9bebd25907f50640b45ad9e1cfdb531189baf09f34e82fa3b6981274f17a
-
Filesize
1KB
MD53117f38cdcaca8ba577b08792ccf9efa
SHA19e47eb13caccde3bca6377fc974fe3ea79362c90
SHA256a68d27773668c5fec1960a44a1630364c5172ef95bc7e0f2ddcc6c3b2c0410cc
SHA512765fb104273b4f1363bf0724a582c891de65297248544af33d1294c27e85fa77176a6bd8d8dca9d1b3f1745e5a5ee0294599f993ddf4a38f26eb78681290f359
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5201ff030de2fbdf0daf7739f7913dc93
SHA13c685fcd4ace01947fe742b37415680c5029b722
SHA256e9d3918ec2615c2d7b951ba2dcab6f564cb52236bc89630c5924ce69224c535a
SHA5122a07ac290076c1b0b00812764213aded5e0bec600778d1c416581e3744dfb0d0d9c15d2dd33f7d50568ad9e4dfebc5e17ea8e6ec4b669056a6e1a3c1df611f62
-
Filesize
7KB
MD5cba18123529c08cc0690dfb3ffca6a75
SHA195957ef691dcf9e6f2c3560f0a2e9c1521a65a7d
SHA256c2dbdf7901cd976359f3cd2e3d04d7b963e08b65c213da142ec332d01d67643b
SHA5128daabeb682e6e7fc8389d45eec902566fd3b3664863fdf89a9170035b93ae3c7e12ce39a1d16e35b0f1f61240854b7ee8c122f404fe22e0ab2118a52534f4656
-
Filesize
255KB
MD5128b3f38db797bc62cbe2c1fce5cd813
SHA164b81333fcdbf64f8de1ee6e97e19c87676c6434
SHA25638486e5dc404ef3a8b588eb50be96560c4a597731d6b646cac15983dced7f004
SHA512f6ca8f605a4d23af07762051119b641e345767e62f12ced577a7bb43c83e78d75e4cc086c512d88eb5951fb3c18df063a1a94a09700f5b9330fee704d8fe770f