Analysis
-
max time kernel
1199s -
max time network
1089s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
01/09/2024, 15:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/XHQyw7 - https://gofile.io/d/jiHWkn
Resource
win10-20240611-en
General
-
Target
https://gofile.io/d/XHQyw7 - https://gofile.io/d/jiHWkn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133697002442117195" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4688 1644 chrome.exe 71 PID 1644 wrote to memory of 4688 1644 chrome.exe 71 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 2872 1644 chrome.exe 73 PID 1644 wrote to memory of 1704 1644 chrome.exe 74 PID 1644 wrote to memory of 1704 1644 chrome.exe 74 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75 PID 1644 wrote to memory of 4500 1644 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/XHQyw7 - https://gofile.io/d/jiHWkn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdef789758,0x7ffdef789768,0x7ffdef7897782⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:22⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3564 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:12⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=828 --field-trial-handle=1664,i,8707646070600616055,12475983295596388934,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440B
MD507e75f7f49fbac47178bff19978fc767
SHA1d4ed02d72a40d7e502939a89950c60ceede2c696
SHA2563ab4ecd5e01d8de437accb9810fccce16d432b20d370d09533f16a117471f18f
SHA512f2b8079d0f4913b08b2edf4cff885a6cad49efe53a9368377fb546e364fee1b93a73466e2b8133247a28949005812793de62888ed3b01e546cad8275ff7d3520
-
Filesize
371B
MD5e0badeaa3f613496d8804e2127cef637
SHA128fd640cdc30605802ed4c59c62c292c2fe76ad0
SHA2560ccf4f42bd8e716b6d932a449875073d248dab648bbab4aa4f7ef4fdea867f61
SHA512cd214d6db37db4aa075003028592cceddabfda5d45fb516c4db66138b97ca5fd8e07b38360c152f591557c6eba6d216ccb61dba2fd7e50523c5505b0266f4619
-
Filesize
5KB
MD5e0250dd2ae321c6655bcf96bcce6caae
SHA1e47ac0a78b3b218ebc1e32bcce047cd4fcd3043f
SHA256351d4ad69f107a999c77f01481caa624ad5bf6d44a87a16d09befec8ab86bbf3
SHA512de6ba709b57d85eb7b1492904d273dc404b721247e34834870b1cb51e2046259591386f862a214c73fc5285fcb6ac73c513a8b0f0628e7c3244e30182a5cc0e1
-
Filesize
6KB
MD5205600cf9f94f693b3ec582d1a1cea41
SHA173fbf5e0613f14bfbccb7c0f0e4289f15c34ad94
SHA256c79793950e0bfcee04a14ebc8fc7927939d183a4643c93c2c4bb80dbbc5b0067
SHA5122a8ca92ec024641b24b83e2474713a8380fe6cafe12682bf52b3d49ea57955be79b6cdfa30857b52cbb7197fa721a99634da0cb7bf81a6f1d625ecf55e2aba12
-
Filesize
5KB
MD53178a7bd6475d01421b93c74d067ee5e
SHA10e4d1765f4296c54aabbbc92931cac5656395b89
SHA2564b751e32c5a8289bcda12629e3bbdf9efaa311f8e7fc651ef239e08298362d05
SHA512cb863e60c5d44ec8f42fddece2b799d5eddbfdf78e457aa605994bc2ee863b32ecfe3e72683113337e856e9467d748cf037cf18cc2d9cc9af34c5833cf3783c4
-
Filesize
167KB
MD595eccc73852b4c1886f375e7e7feb00f
SHA12a3da668bb6aa6cadc98b06a240a0ad4715a126d
SHA256d35f1f19fecc698504ae5090137da1cd1137092cd6f2d0ac4baba22501bfa293
SHA512a7617c1ecfdae3efe6b6cfe64e9a9ae9ae885e2a80df3c352c0af5735b6a87f6355f26eae798dfa47c5e1fa6ebc2bbc19ab6b55272e5189d7c636b1b00ab7671
-
Filesize
150KB
MD5d0b6ba2b6d3cc625d0ccdac399eca0b5
SHA1f61f3b7f1571b301c51b9ea704faa179d65d1fab
SHA256b819a946fde0029724e366e004e80f82e07cc05e17ada66f0eeaf0b2549e6426
SHA51283a26b619e546b75c193d97d1c44240447382a0290df093c90206788c626ad0120d03bfc86a098ec48029baff31a86743a864d1dfc8678a0e295f77ed342b3a9
-
Filesize
150KB
MD5250f803fa5564ffb818fe2d3d288a4cd
SHA120175050018c738decd0236de24dc103a6f8f851
SHA2567e7701526d7d2404dc549d0f013ce50cf2cb2a3ffe39aac83e515b1bc4297807
SHA512c1e47e043fc45b26cd72a3d2197cd70c4adfbe7e0d488cecedf2371752c01819659d4b1af3c3e2b2d99fbf5c5f1ea69cabb1f05f43bbab87b9a7313baf28e2c8
-
Filesize
150KB
MD51f4e95f1e225af1957f14cc1182a3b9b
SHA1608613d549c80dbd4f0f538b45d727f0f47f6545
SHA256716d063e02dc9cc0013cafe888ba669259a202b5f176390c98c5bb21f2bf48b0
SHA5128eba11d5c761ac4f260eb05b1f9ec7fad98248ebb3ce230b4b44589fafd0eb561479481262a25dc912154e3e87e585d33153b35faef498f47eece4a1e3ce9f0c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd