Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 14:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://content.app-us1.com/cdn-cgi/image/dpr=2,fit=scale-down,format=auto,onerror=redirect,width=650/OgA0G/2024/09/03/a03eb84c-61dd-4349-90f9-4894f7fd7ed0.png
Resource
win10v2004-20240802-en
General
-
Target
https://content.app-us1.com/cdn-cgi/image/dpr=2,fit=scale-down,format=auto,onerror=redirect,width=650/OgA0G/2024/09/03/a03eb84c-61dd-4349-90f9-4894f7fd7ed0.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133703655100488522" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1128 2360 chrome.exe 83 PID 2360 wrote to memory of 1128 2360 chrome.exe 83 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3876 2360 chrome.exe 84 PID 2360 wrote to memory of 3916 2360 chrome.exe 85 PID 2360 wrote to memory of 3916 2360 chrome.exe 85 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86 PID 2360 wrote to memory of 4424 2360 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://content.app-us1.com/cdn-cgi/image/dpr=2,fit=scale-down,format=auto,onerror=redirect,width=650/OgA0G/2024/09/03/a03eb84c-61dd-4349-90f9-4894f7fd7ed0.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xd8,0xfc,0x100,0x80,0x104,0x7ffcb5b4cc40,0x7ffcb5b4cc4c,0x7ffcb5b4cc582⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3712,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4468 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=212,i,2960096685550670191,1999387961184426593,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD585df1b2f297bdf80cfb49bddd643839a
SHA1089fdf7fa0de3b58cf0a000f9a6a9c41cd643242
SHA2564ca95d4a0c33f203dc8c60b1a3fecccaa5946da8b72eab3a4f2f548c4adc57c8
SHA512e8f2ad36ad6dbfc24a75243e01c039fc8401d04a778ed6262473413af0b4b9fbe034b2efb96ff558ecd1d7839477c5f3d2ed25b7d24c613d532a69c5bc81c29e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7dd76fdc-96b1-451e-bcac-6834d4fb2cea.tmp
Filesize1KB
MD593d24ac1d247aaffbc9ec13c67cbf5ed
SHA187689b5bff6b68073189e2d46e111d10ff9c8d4e
SHA25627da5fca70540c9e57387363dda0d757693fa6eabbe77c964307f155f56a96a9
SHA51242a0f3492a7eb15152eab25e2972b96066aae988f8fcf7883590955c8a3f91ba21cb8128d8f7912a0f83c5deaa496abc3efadbf2d0139d213a14f53958d8a07c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5cd12c6e5562f1ca7e2377ff3be40de22
SHA198bc536204f9ada0e5de2e5c0457d014781ed6e0
SHA2564faf50f4a93f3abc5e6ba75bec416894056a93058f88bf243b66585a9359ada8
SHA51250741cdf8d2b004c8906a97b3cf8c7b5d2991b17c89b3fd7657d78280ccec31046881caa885ce504b32dadc470e919566ea278521b90b6ce5c6c57c071d95d9b
-
Filesize
9KB
MD59c632895ae2cd0ad4657081d3903058b
SHA1e9bf958332dc5572b8499104081af35b90428101
SHA256d5ddd1e8eaacdfdae83d7671b5357f0929c1dfd6931a89c3aeb6b5f14649bfc7
SHA5126d95661d489ba1cf2fe94d97f3a1de5ea0ccab011635237ac6e70b8947fde677d6233a106c0c523495a4f1eb17edd3430df4d1fa88c20bccb4bd05206947febb
-
Filesize
9KB
MD5c3ebe52387ac5683ae233a4108b22747
SHA12a12e8d81344db41747da57f9d804d6fcd91b96c
SHA25646ff1f18aa724d80fbbd7fb3ee31e6fcd34abba85977b26def7b7eda6fb63688
SHA5121a23fbc71d79539bd55747aa4a93be8cdcd2a0a3b8e2e78c7f316fd9f9aa6d4c04fe15769ed7845fa4cde3f6415bd1ebc6eab148d05d4a9b90b753a3c466ae91
-
Filesize
9KB
MD5c44899e12cffaf357fa1d9cbffdd9f01
SHA1d1877593441aa4de680a14912018c2a84475e726
SHA256014dcd4ae7f3b2dc82194f9bdd7ff5948e4b18ab5decf4e46fb41c9467bfca3b
SHA5120f6d7ca5e4003e3f01f2cef9ffc6f05f2b2e273c2b97999206dca44adf1b0499417e021927b0093ae96671ad8bcff772c74f4b7090c3da3d2d07ad23984227eb
-
Filesize
9KB
MD5d9153bbb49660621f1d0275b1fefd7f2
SHA1cae1121e307d0d8f07cabbe17c2387c9cb74d6fb
SHA25612a9872537ccb58399e26fde983b7c0cd58337d5436d00b872b59fab4dc98eb9
SHA512cc26dead3ff10bd0bb8854e46cbf340f8698afb1d6b909653ba5620a2e0b66688f4a5f5b9e489c9484f2479efa1399a8beeee576e88e44a6e8f9d7ef4b907c1d
-
Filesize
9KB
MD55a68ae326d6e11974ca32a4cc25bd8ae
SHA168ef0319222d7d9fe33567aec9776f8318f67937
SHA256aaac494d50554f03bb482ebd5388c63976c9f27732e93f38084b1490868a55c5
SHA5123836730c236961eec3a89285ef60f1e52800383d3df750b4bf3aff271c8af5472c8140114b8a5d0a78a83d7ba46076b0051dccc18223fbec8480a505a7c44b2b
-
Filesize
99KB
MD571de5bab2191cd5fe5e5eebc6158d35b
SHA19852f8b5ee3784f3060e376a2391da5d74e530ac
SHA25689813b908564f4f142bfdd2832fb69a3f5bdf17b628e732d1db763ae9ea58d01
SHA51222951bf2bc474bb599c773a665d65b58fa26fdd272e85d1bb5290bf55aba8fbca27b743af9ce909063d53ad51ba29fccfe253b482c75b161f6ff50830e33d7a3
-
Filesize
99KB
MD5b35662aa4f56656465fd33a8a67450c0
SHA146d4982404d865fc49bccd2dcb55e4c4164fb063
SHA256d801c413743794dfcfeae18afe149a1f539f12b6baed8158db5d520cdabdb2e4
SHA512f0eb05eac990221fb06a2d2406579dc7112f18ca2bccc948d8a403ad1f3cf6e3cc1745f6500b8d2cd8ddcbc5b7243ce5983e3c661d003cbdebfbedb236059026