Analysis
-
max time kernel
80s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 13:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://note.usachess.org/fgtyhujxchgfdfghjkjhgfghjkjhghjkjhgfghjkjhgf
Resource
win10v2004-20240802-en
General
-
Target
https://note.usachess.org/fgtyhujxchgfdfghjkjhgfghjkjhghjkjhgfghjkjhgf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676854552347587" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2172 4976 chrome.exe 83 PID 4976 wrote to memory of 2172 4976 chrome.exe 83 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 3216 4976 chrome.exe 85 PID 4976 wrote to memory of 4524 4976 chrome.exe 86 PID 4976 wrote to memory of 4524 4976 chrome.exe 86 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87 PID 4976 wrote to memory of 4196 4976 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://note.usachess.org/fgtyhujxchgfdfghjkjhgfghjkjhghjkjhgfghjkjhgf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffceec6cc40,0x7ffceec6cc4c,0x7ffceec6cc582⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2228 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4348,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1576 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3440,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3288 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4852,i,64797405844490402,13190652723472341528,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3348
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x4f01⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5599f2f307bafbd74e8edddfcf6c03021
SHA1d87cde841c449a515a95b8777421c40f35623531
SHA256d9e67a722905ac5a57c22e490b84ee97f02b8ded921b36e9186e0ca2e5e886bb
SHA512dfd8b1d73d68cb431e3e5de065eb133e3e89511fccdbe4ff90e035aec5b1f46d106441ea0864c9bcedf17982613fad775ef43708adf8cf36cea27034fafa7374
-
Filesize
672B
MD5f05795f450a1d47c73d0d4250101b3e1
SHA13fec4061a99b4e5ac626c501ff27043610007c6e
SHA256c400679424916a16230029b187f243e2c989884d1f4b092af8e2e8e789cf002b
SHA51250e79ddd6b67cd08c3ce2fabd0ca84519a2e518bd203d8a48569c796bb00da70820c149ba9850d75a011c8793fc826f87f4289f37010a09d5f9bacb3d77ed910
-
Filesize
10KB
MD5bdcdc17251639c47aa8d526bc9c2f31e
SHA1ffd99afbb26153ff365b49cd501a5960fa3734db
SHA256fa9577904be060a742ba2fc09252ab684f7b1a628490436614e328e96f4be3f4
SHA512ac3cf68e6e609982229b5901d9016e32819be85d13a3dfb090ca311a62b817d6926f48009ad8f813c3a38defe272c351649507f9d33b89d9bd87ed8070d583c9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD52a66d5be429da43a9ad8cd0b33a57cbc
SHA165ba20a281e2f20b5a836a6e2a660b223503c937
SHA25662ccd054dc1ac416bcfbbcc67a0f864c13c5e497e70af744b1648fb759a40e38
SHA5129617aaf1b619d19168df7a796a2d6dc4d45d4bdf8003016ad97d6fac6cda0e30b76bcc3eedfb58f2c6798bd13ffeba1a28de2cbadff8692ecd39ac28e789dd04
-
Filesize
9KB
MD547bf42c607812e5932ef573458a3e984
SHA10d3013e81849cef11071933be7e4befa129721cf
SHA256f9a17cb161d44bb4ebde664b4b95098e94f1d2ff18e17ac232de215726f7aa1b
SHA512d9dfda644d5395914ad8f05aa4a166ead3ce82f57179099e9fcefc8bd08bdce3d87b3fc7b7f50aa0f5284648f07b06e7334158232183265b86df798c0641b5c8
-
Filesize
9KB
MD5ee6e6ee7331ccadf713fb788aa1a978c
SHA1d7ea3c468fa753c339fdaa36149560434a60eea4
SHA256e693eda6f7379c6d338e097a8c134a6de17bdf7011c75fbfd3b284ca1bb7811e
SHA5125172d8eb59a7e999c15a4de40c5af729bdb11b4f5886dfedde9d518403df1c9903361f24a3a1443fa895c068bf7ef4547151c05c060a677bfe9b0eefb25937ad
-
Filesize
9KB
MD56698ccc97e18761b4a2c681ba99bc315
SHA1c6cb3d565e0ddabee193eaa4a18434648e3fb5ae
SHA256085883008eb2bc7042acfa70bb66f0f36aa3df3215087b21694d061a81223860
SHA5129f9b54918bc27b63a4a76c5f592bf550c4a9b257bd3b1d21e34f2cd0d6d1da85559e61399149285f8f820049ad6fb1997840ae1556a620aa68d8e52c6a7244b5
-
Filesize
9KB
MD53eaa3cf447a501dd5b1932eb9a6b065c
SHA14a1184db664404ba875be1bf8a63b5a20d83fd07
SHA256314e0f6f12c2bc24ff2ca67cd493d27a09e10b912114ad25d3e66c10f9f6c091
SHA512631e38ae28220a9120f1db6777fae846df8d933b705d94d587f8e2283a09afddbe99d4cba4f69deb45adf66fd671ffad05d3fe0203230683d914d4fdf8956d34
-
Filesize
9KB
MD591053c0774e5cdb4fb92f27e60544ee6
SHA14ebe1baa2298f09845a05aa4d162e725c667d131
SHA256ac2561c233c8758008b1ac75e34bf7ab88974fec311ee30ca8e7475dce1aad00
SHA51243a6b04d455606d5c82554dfd1b29ee622dd75bf01ccdbf468ede7c11da8097293c380b55ec8e1ad8194e960213dd01f2f2a8b81a1bf9c2a1f7b89e50887abc7
-
Filesize
99KB
MD5821fb66be514c8832b5b0892ec8f3cbb
SHA17e88b7e812ed9595ad804c181a6b4860ea5d57c9
SHA256abf02c0699cf25661c82d605a6ff6d975419b430c4c506b00d4569fbec914298
SHA512626783f0e300c7deae087dc9b7c2545bdb1de8b90a4609488182e173feb5a1b8fb6d54fe338b9c1bc37066074e7d533bf88fa8b248fc41e513e3f7a543689953
-
Filesize
99KB
MD5b9e43f6d8855b6ba50180ea42ad6fea0
SHA17381e4e3bffbbc1913a568bc8f7b7c20c71d71cb
SHA256fe0cf566043e1316aa96b9e811dcf4aa0b2544d309684b638c35721dbceab433
SHA512380e02891fe49ad039351f63d04e5408a35c8c3901178c60463b11ece537ba82b3d74e2d3a05647b49c3b45a0dcf0b67939b0b0033db317f0a286b35fa76ba50