Analysis
-
max time kernel
26s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 19:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mcusercontent.com/adb8cabcece6f7b67f990974f/images/91d91acd-822b-b2ea-28a3-3512e7a81c02.png)
Resource
win10v2004-20240508-en
General
-
Target
https://mcusercontent.com/adb8cabcece6f7b67f990974f/images/91d91acd-822b-b2ea-28a3-3512e7a81c02.png)
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643364972635045" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4412 3068 chrome.exe 81 PID 3068 wrote to memory of 4412 3068 chrome.exe 81 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3352 3068 chrome.exe 82 PID 3068 wrote to memory of 3728 3068 chrome.exe 83 PID 3068 wrote to memory of 3728 3068 chrome.exe 83 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84 PID 3068 wrote to memory of 3488 3068 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mcusercontent.com/adb8cabcece6f7b67f990974f/images/91d91acd-822b-b2ea-28a3-3512e7a81c02.png)1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa087fab58,0x7ffa087fab68,0x7ffa087fab782⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:82⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5112 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4140 --field-trial-handle=1952,i,5268340036150547908,3853036120024163236,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5a4906783d4f3262d874cee326a4dda3d
SHA1d53fdd6ef53ccb931ca9e17466b3d73dc03756f9
SHA256dbf206dbf732dac3049829dce302768cc8106d520d1df573a99cd5f29fefef28
SHA51281915b88a4ef3de826093dd674e88502a0440a0776f3db56351a68cd71b88dcb7878857493ff3675ab35de70bdd62391c85699a4bbc177104dd9336383458d6f
-
Filesize
257KB
MD504e49975e708be537271c605d73d38c4
SHA1190f9865b2a9344ec387f7737b2587cc2a89ad03
SHA2566eedb938cee9001957b37cca02146e7fa9d89df99a1eeb98ebb93457ff6b0680
SHA512e2ac6e3a203c6fc7be1772c3c20580f52d4593e0dab637d60d534e7fbf7a11b38775ec34e274a2d6d685ef6bc6f598de66e818450da6966cd90be603e792e9cb
-
Filesize
257KB
MD54c5a57f9acb587ee351b8f4f080d695c
SHA1c414aebebb0ca30c05312d4483744f96b7ba1086
SHA256ff15ead12c62ef6042e0c4db45db397612294fc6888fa6204a02b0035fad3ae1
SHA5123bfbcea5e4a07fdeda1d85f557de268c66bbc733a13d9b28c2a1290b77e1688d2d107572bf081cb1e5f52255e615fc040bb4decc4c764ef629eead03c4ed083c