Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 03:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://finalstepgetshere.com/uploads/il11.txt
Resource
win10v2004-20240802-en
General
-
Target
https://finalstepgetshere.com/uploads/il11.txt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133723124829521714" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 216 chrome.exe 216 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 216 chrome.exe 216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 2604 216 chrome.exe 82 PID 216 wrote to memory of 2604 216 chrome.exe 82 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 828 216 chrome.exe 83 PID 216 wrote to memory of 1008 216 chrome.exe 84 PID 216 wrote to memory of 1008 216 chrome.exe 84 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85 PID 216 wrote to memory of 3444 216 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://finalstepgetshere.com/uploads/il11.txt1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3793cc40,0x7fff3793cc4c,0x7fff3793cc582⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4320 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,8859652060471530670,8824831172204192069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b810ee895bcd33e3a0c9fca5eb674030
SHA15b19192650aff0645300a3a67e88075b814ceef0
SHA256eef3824a8ad360e9ec505fca981e5145c604bc935b73f8db6e594a8004f58ea9
SHA512978f5191b1d6087e70147590db2cb83ff031157302ef2095fd50715db77c03b4d0d88575ab7dd3180c0e751ed967538c2a177ebae98a40376778220bfe5c0ac6
-
Filesize
1KB
MD5e884706898c97371a36cf30de8566557
SHA1683775e5c8d490331f146a84e61a4267120e4725
SHA256621c1c295a680c7a55693f0c83f43719619908f2b12dd9507e802f7066b5b9be
SHA5123c1c0ed899e3e5bc3e61abadd30c6f6ef27e9d73d0a43ae79588c7a706c894de7671c2bc0fe598e7b3ccbf5e80852cd4b2766cad7d8dbc1f272178c93745fac5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5a8381d72fc0ecb73e8318a093cc453b4
SHA1535cc4858b398027de2e7414443029ab1dfe57b9
SHA256b6d315a975afec08c28d0e1119bf401d10282d32dff213d7091d0847faf6796f
SHA5126a667f492da1a4b80df390ea0b127f03f67ffccd8f991a40249673690d6f601973e97857f16b327b1325eb14c345bfeecdc434bd728d90c25b945bfe5a234206
-
Filesize
9KB
MD5e469bc71e99d7321518a2fa471b31c23
SHA1d6b00a827991b33a489081fc770f639bbb903e45
SHA256df659b3c070188df0a41470fd5cce6bb88a5b7fdb5e8436a0e005d915dbb8b24
SHA512ffd6755928258763ea0831b6591985d5aa7fa34bd89b5998bd4291c8d5c94aa63ba2937d444549b22a3111598b78e233bb736f743094be36a76548e2d05ce9ba
-
Filesize
9KB
MD5d3b8dd35b7d4e87b5a93b6a38084c292
SHA12c1fd372b4a9dd6ee67e77d87909661297cbfc0e
SHA256872f1e57ecc04462cb42740dd28448bc1bd636facf6aa9d94112755b735ddd7f
SHA51237063481bbcfa9615bc0e42169c9bed9eadc6d402ebd45538c2c98b336c2b0176f38a1f3019875fd5f5e0e07a00ea1970ecf8e2be7fc237472a4e2af4d4593a0
-
Filesize
9KB
MD588ad1047a28d1f3f07641e073c8d64fc
SHA1fdc9d732a4a47c5b90bd4bbbfc3489265f63b5ae
SHA256862ba66b6ea19cca415db9f4e9266c6800cb86f8d16c458619ccdf821e1cc60d
SHA5128e8647c80c54a18e2c8e0128c3903a6f0bcd779ed3c1a81bb16db289ed4f3b57144cf68a40f9b3d6af2559d43fa2a474f26216e3e8cd74188be9bab636e48608
-
Filesize
9KB
MD5ed55e117cdaa1eff855621b1b40bda09
SHA18c1d2d6bfd393610fd216b29bb486c228362524d
SHA256290867e0b2a2edad20d126a46df8aef8deb0251e78712dbaa180a9d9f555f3ad
SHA512170349de0a0fe8f1911be1139d868c67840b3bb8667b8a8bed283432264846f0ce70e60e111c8a36c518f2bd67dd59c48fa4f6f0d2162b51727defb0caa9ac87
-
Filesize
9KB
MD53c8fd9776f2ec64aae8cb74dcc2196d4
SHA1a68e294de006ad2fadf6def6efae6fb854a0790a
SHA25695d63f95483981a69644d58a3639145dfd474e12f99710de013aa320f944bf58
SHA512eb5696853a6334fa26980cf0793038012d57632c75a1085ad549d0f4332759442a1f225a190571a9d224197d9c05d3ed471312291b0f891f5981e4ed0f1bc887
-
Filesize
9KB
MD5bd0cb87305f691376afd580039a8e957
SHA165bad2f6c4423e7aa70926e0ced7d993d69afe22
SHA256d6c2f3226d073cef56ce7431d64d07e24fb32e4373c9e58b0b44e113aeba4337
SHA5124c19754517ba77eed00998407caade9f8a3e7af6e4b4ce3f911a65df628767e9c304d07f9539f570faa1876a3cb8722ba5eea92dd9888911ea90e01055b15576
-
Filesize
99KB
MD5fc645546a1079312dc5c4a148e55f879
SHA102f37f96195297c6097f207e82c2004f4cb47958
SHA256eae4a2c75c8b3f21bb85eb5a199811ed55b663025356f8a28d49b0bd8724850d
SHA512e024f014cf4b3c9f566310b6403c46df19c825e9f684df6e1eea40090e856e885aa614bc6631c55e14ac5dc2d9275bedc2fff8f9a5e2d543606d77f77885ed72
-
Filesize
99KB
MD5547430a1db0ecebe6becbc3d4833746f
SHA1ed055fe40adb9424daa846691e13ed112520e97d
SHA25686a98e45a0b012fb2dc4d03c0e5b166fe8d4088001ac52da93a39edb57aa6040
SHA51244c054c5995705c7e1ab141eabea569fd8a02830d6bb0cd71874aa147c29cef8555a68b8ef6e6b1772d11f061ccfe0950e71185c35c3d7d2f6673944e55e49b9