Analysis
-
max time kernel
0s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 17:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://eepurl.com/iPz_hA
Resource
win10v2004-20240508-en
General
-
Target
http://eepurl.com/iPz_hA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1172 5112 chrome.exe 81 PID 5112 wrote to memory of 1172 5112 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://eepurl.com/iPz_hA1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ecab58,0x7ffea6ecab68,0x7ffea6ecab782⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1928,i,6025706190147253556,10370439485062745890,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\612621c4-f197-41f3-a5d9-547b917aea0c.tmp
Filesize7KB
MD5d2d212e56cb57aecacc6f3bfed20c5fc
SHA1b954d8aa84f08bf2008bcc499e420fec061de140
SHA256096777a1c549a0b3ec732ba1f721f183fb2ee86b50402cb7c19b4f47505ded42
SHA51216581db830384947c81ba48ea7f8094e1e13487680d04e6371395b16cafc6644496e1e527b1eaa8789d2f3cb323791e6b63677ba75feb3558c29f9be67ee468c
-
Filesize
96B
MD5347b33c817c51b229fbdf24a0b992a66
SHA1b1dc98feeac6f1708f2e5a14e4e1ae0a1a9df1d7
SHA2565ea167b68b3491a640baf6912e8b34bd6ac4e3518d75bb1e5a902e3cf7b8dcf2
SHA512484cb3273fe2f253af37e6f73945d31f72c590a57d54281837d5ce738c928c809b0d2891ee21fa18483d54e1511115b0f70f27d7699a9322afc80bde78ebdb58
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD57db10dae874483f815425b2f18e80cf4
SHA1ed3c94808e8827ae28c5c5dac4c1c6325d226e3c
SHA2569ead79531e909bf4b8ae3998330b0f71a757e3a80d90c6642af4daf45f92d8ef
SHA512e4f1daba706492364326e41b82ca55b2b9fa7e3bda73b1dbd9075425a1e400935d9d5d24a7c398f1d20d3018b3f9ee0501776a6fb1a888c2e332a2d67e60e7e4
-
Filesize
7KB
MD5f9c067933fc0f781c05851121f51c346
SHA172c870b468216386a34db61480ba70165b0b8018
SHA2565e791ae0120d6eda38298d8ed205452b6003f282c2f9a5d29b6ccb5fb71026d3
SHA512d04224f0057992f6c7b4cebb4b83da70023b6d794eda564b9b5efa8ec5c1507ab3ac73a6097ea59199bf3a9c46c038c876c2ed080953ab18d821c91210925a50
-
Filesize
255KB
MD5c4cf87880292b6cc6b1ba363d1261e4b
SHA1849db6e4bab93b24e317072e527b2b62818a189a
SHA256baa18ac99654350ad7a244101052de6e86d0ca87c9e0cc47bbd15d454c320620
SHA512259583ffc7c87b3fdc4e28e29a53a59e14758c70b8f907cb370f303cf2a781e0f551cda6b23c46f6a851a2975ac8609a6ef3a0e861a3ced463f3e330b0ea1163