Analysis
-
max time kernel
14s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 15:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.miro.com/7dea362b-3fac-3e00-956a-4952a3d4f474
Resource
win10v2004-20240802-en
General
-
Target
https://go.miro.com/7dea362b-3fac-3e00-956a-4952a3d4f474
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680367601548738" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4124 1600 chrome.exe 84 PID 1600 wrote to memory of 4124 1600 chrome.exe 84 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4540 1600 chrome.exe 85 PID 1600 wrote to memory of 4884 1600 chrome.exe 86 PID 1600 wrote to memory of 4884 1600 chrome.exe 86 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87 PID 1600 wrote to memory of 3384 1600 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.miro.com/7dea362b-3fac-3e00-956a-4952a3d4f4741⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0b42cc40,0x7ffa0b42cc4c,0x7ffa0b42cc582⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1636,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2032 /prefetch:32⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4680,i,6834997859748458521,780547126788710008,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD565dcd0906e3f9391d494f4033a2714d6
SHA11b24ac11e99def37b8829517b6c00b11ad2f3d43
SHA256ae7711d9f712770e2f7c01203782f3347d99834480d77ffb0dd875281cb5d87d
SHA512e20d26a53c1cd651f7050a01ba28cdb4a2f46ec38805b371ea35331a138ddfbfc38e57393e3cdd8c03f6570d0545c7d233c439c254ce5ae81e1a076c625704e4
-
Filesize
1KB
MD528e84430bef297bf04d1493340937faa
SHA1e386a740af982350fec1178a78abd6a98a67069c
SHA256d31866e0f17136b43921950977caaa4823b96d0afa391d378fc1d068d66fd9c0
SHA51260e23c3aaf46394262da24fbe5aaa429abdb00a7e193a07a909333150a74fd23b54946c3be0139243babd76e33843baa106c0eada50c345c6a713f4810cf7f5d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1024B
MD54c4b9e2a983df4a6714b384251ee08fd
SHA11551578f834f8b965aeac4519741161ae2d395c8
SHA2566a34ca7a70653c283af1af20c42a405201ee5732e4fa251f28e67bf929c5e9e1
SHA5126fec13031dae218e6176666207f6972dd8af6b849fcb961aca3394e1ffd5e00ff9f5bb27ff8f501c59ac03b32dfb2f59ffaea6cad5b11cbb7c8ee5851a08fe75
-
Filesize
9KB
MD508090aa1b6cd54ba809dd6eba80e4ff3
SHA1553751299dfcf290ef715a6541579ca096e9c6f8
SHA25633de55106e384175d5118f5274c6ffe59f248176009c14925ab3f16159f73870
SHA512e64bab45cef9ae429c04e3d81feac9a63da236e34d7481d60b6179c8b0356212e0176453e62ac3328d71e2af6cd46142ac047ed55c8b873b56ce9b1b82a96933
-
Filesize
99KB
MD59d9c2720bcf387039e977e285017e5fb
SHA154f8f33c012eeb96dc98e581a0798736037c2296
SHA2560450036b2258e0a824533d12a24769447a7abb4635755f23d540f97df7d3f338
SHA5129cc8054d1179e6c832ea5ea240852ab4ba66f74330c6775274145508dd2819e24a00e53b93011bcc2b971f4e0fa9a72f0e351198f1342efe83148744aef56b53