Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 08:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cloze.com/in/
Resource
win10v2004-20240611-en
General
-
Target
https://www.cloze.com/in/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642958630543888" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3708 3068 chrome.exe 82 PID 3068 wrote to memory of 3708 3068 chrome.exe 82 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 624 3068 chrome.exe 83 PID 3068 wrote to memory of 1376 3068 chrome.exe 84 PID 3068 wrote to memory of 1376 3068 chrome.exe 84 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85 PID 3068 wrote to memory of 3524 3068 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.cloze.com/in/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a24eab58,0x7ff9a24eab68,0x7ff9a24eab782⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:22⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1912,i,4764565333987714821,6174763009443175246,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD58c4bc6a5425c2b0fbf8bea6d300a82bb
SHA1bd8d171e48c8e2f122a2bdb2d2822616d680c65e
SHA25694767552bb465d034d1df92f7f2f40c7f3418d9bc0c06a5e6c2c9e9496ec4eaa
SHA512f7157e062a64e65c39225521ea6ba8b13dea328b7f6cae1001f16d579e01943a2a6740a78e5fb8315f292b945e2f7911cba8a3736a6a17e7880dfbbf5b8e2c88
-
Filesize
2KB
MD56c195d7a3fd2324a2543f6eeee15657e
SHA12a40596ab3bd86188aaba5f0a94873f734782fbe
SHA256619ff093313498d778bda6aa19902a09b515d20d24844d3e18e87d366e3654ac
SHA5128510dc29662118ec987e8834fbf02e827396394770f22fc60814a6d7cb1061fd40d3c3104372a0c63defd02474a0601d850b572e755e73f19ba481c241f46a76
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD50d64344eead29c827f8d7612e6a55348
SHA10b8784bfcef191b904e826bd69aa6ae0e8bc2dc6
SHA256496f1a6799907b63361ee8fa87ab601f3ac529b41ad4a42bb681f96c3b8d87b5
SHA51251155630a07479984f18df82f15ba2442fdc21b821edabbee02334ac1d95ae3607a9db85ff2129e781b295e2abc1c68b9377128a7233ab398d984e1513814b1e
-
Filesize
7KB
MD5769ced70fb27bf7587ba85684d325f16
SHA1732fdfc207b6f2bd333ddf6781c4b7a210ab3725
SHA2561aba9f0d74d80eef4b4b16ae504947bf185e3d280f7d5d43a58bf1502ab3a467
SHA512d3eb758ddda5a9657d025e4871a6d8bfd9423e605293cf11db2093f3d4439f233ad3b3d4a8bd63287564858924f678915722e3330243e62a37e871d9fbc31f73
-
Filesize
138KB
MD56e62bed341fdb6af06f457d5fcce0a09
SHA17f9384c391f317101204990c0d288f20a76a5085
SHA256a7f5307ceafb4e5e12b2ac6ef38a0d93292407c9d75c942d15c51f70bff91592
SHA51216c1b0f1fef0f9aeff1f2a55d29e95cb075b2dea0b780b00c79367a182ec21df91ad21ec33fae1b2973ec3ee905a846ac64ca228c35315fed54126da322b37f0