Analysis
-
max time kernel
16s -
max time network
12s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/09/2024, 12:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/kEzbIA
Resource
win10-20240404-en
General
-
Target
https://u.to/kEzbIA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133703582589760153" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3124 4512 chrome.exe 73 PID 4512 wrote to memory of 3124 4512 chrome.exe 73 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4652 4512 chrome.exe 75 PID 4512 wrote to memory of 4412 4512 chrome.exe 76 PID 4512 wrote to memory of 4412 4512 chrome.exe 76 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77 PID 4512 wrote to memory of 1720 4512 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u.to/kEzbIA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9ce089758,0x7ff9ce089768,0x7ff9ce0897782⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:22⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1328 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4800 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3116 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4372 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4720 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4808 --field-trial-handle=1820,i,16898620915072036350,13257766434991019454,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:68
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD575745207d3d8b50d6f834182708a92c1
SHA1c91d6b0680a9b1b3d687ede0f35afd8af3709774
SHA256a0a095efbf29503013e2f43e0856b7750822c263468378ed75c02e07392e3f0a
SHA51260067ec3ad6464eb886ec2d4cc2b82d4a873a944f5a0e943a6dc92eee834623a0ec17541cc9c63b841b0610de472423d779bcc1c69f82b12c56121f507feebcb
-
Filesize
138KB
MD517f1f3b72bcf51a0a130df997d3c3243
SHA1d159ea644abccebacb31725794b524d1d49122a6
SHA25620764c03b34b36c715969594bf3f75184bbc2e0b4d3874f0e4b734d8c025aeec
SHA5129d4e99b5a8dcd5fca638f10ad3c75486b17bf787892e755878f30e73ee3a3db78bf32533ca4afad2fcfa69a6cd2543e1ace6de253bb4fa2cd38e62c818eac28d
-
Filesize
137KB
MD5325f4cc19cab7c71185efa330a5659ac
SHA1653585016b84e33f7a1bcdd33b9cabeba2017b9c
SHA256ca441eae4dbb31d9efe8086ed0c1eb3a4027f73593169bb37b5108787f6336a5
SHA5126e4d529c32073c21590dca4f0ff6eee0a433dc7cd567d465184f6e764188798ede5f7291765cfd4e6cf274aa2cb278834d0f64a3b35a06a4994a7b3e9486bd4f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd