Analysis
-
max time kernel
599s -
max time network
592s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/udtge0fwwbo0ti1
Resource
win10v2004-20240704-en
General
-
Target
https://www.mediafire.com/file/udtge0fwwbo0ti1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133659660599821203" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2136 2640 chrome.exe 83 PID 2640 wrote to memory of 2136 2640 chrome.exe 83 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 2992 2640 chrome.exe 84 PID 2640 wrote to memory of 4624 2640 chrome.exe 85 PID 2640 wrote to memory of 4624 2640 chrome.exe 85 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86 PID 2640 wrote to memory of 5060 2640 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/udtge0fwwbo0ti11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85ba9ab58,0x7ff85ba9ab68,0x7ff85ba9ab782⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:22⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:12⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 --field-trial-handle=1840,i,4955953096621200568,7754183964652447642,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bfdc5fba0e6947dd1ff13bc4c83b4b3e
SHA121f3b917d3086246f0cae01b5385d5791fdea2ca
SHA25626d803de2350cd16ae16210b7e263106e9e5d04a31fca53c428f605020bd8b02
SHA5121a428720cb840e3e4d040a1ce88d7d6caadd348f766b408f3935eb48ce56fbcd2797d65f3c36bd7d3e7b728d0fd760d6e78de9e54b3f4d4e871fb29b7d9d32a0
-
Filesize
7KB
MD59d55384c00615c86bf58baa61f10d749
SHA1e23f3511de0b3e3ccb347e962b208c29a0e090b1
SHA256df84a59905b61abe0f0cee0b9045c4197005cd43c29aa33f69fba8ab0ecf989d
SHA51278f67738cd8a20678ab309428c6dab948ead459557340ae21339c8c684e8a1835313ef4b73f8ced02700fe514f0f35f6178eeaac85af0b4cf848252df11ec2c3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5e5ab1d9cd6b9a10565c576bec948e83f
SHA1871f2003aa181f7a6ae1c4ac022c7c6df1d63d6a
SHA256f01198711c07d98826c5be1d1298a2c4172a96819e4227b271696d50d8010b7c
SHA51224f9b02497c4ab392018dab88b490ff0530a79c715292ea0302ae26836bb094739eff84b9cf71385b9520d841b0f92214fa1a4a06e539401992a0249d62e48dd
-
Filesize
7KB
MD5ae3a2a7ca291b4eb284ad1d3f71dcf6f
SHA11e519bfc7f2a00776346367c6996cdb568ec89fd
SHA2560753ee892355c30a234ad45f754dea3f9532420c986629f2d3b01a1c8d380242
SHA512b9f1fce05f5342900c989fcc5080bc81f75faaf9dc9ff04580842066ddc6f8d4aa44df3ada8344e6d3cb0f332525ca5755838e9943df6bb34b72c1aaac681d8e
-
Filesize
144KB
MD5b83162ba99e4c29d26026c01e81f48c2
SHA1fca2efef92970d0ad4865b674159570bf18b2cdd
SHA2560737f35a1a120bcf62fb4c2fcf38145d207fd1201eff3cbe2e2361244c10baa4
SHA51243917417677c8fa5e0ef2b816993b6dd5409167f0b3917cd297b70bf12eed43cc82a029717a050227c901f9ff05816d34d501c66410dbd640e92e4621027b7d8