Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2024 19:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ibb.co/616dsT9
Resource
win10-20240404-en
General
-
Target
https://ibb.co/616dsT9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133724560206304322" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 2536 chrome.exe 2536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3964 1424 chrome.exe 74 PID 1424 wrote to memory of 3964 1424 chrome.exe 74 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 2480 1424 chrome.exe 76 PID 1424 wrote to memory of 1192 1424 chrome.exe 77 PID 1424 wrote to memory of 1192 1424 chrome.exe 77 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78 PID 1424 wrote to memory of 988 1424 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ibb.co/616dsT91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8d8869758,0x7ff8d8869768,0x7ff8d88697782⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4432 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4644 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3812 --field-trial-handle=1832,i,1035751671274753127,3219364365136304070,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD52261bb97bf16b0ce6c775a8a1393d20f
SHA1842dcef6798249b81b2a614b6488802f8235959b
SHA256482288953b483d6b9159a4d23845c2debfc309be23f195209c65325b9513d491
SHA512d5ff8c73bf9f0894af8f1fee3992aa117a18d19a400c77508134aebe7b71bf47fc1ce9902168b50f8b8be3ca1a396f59dd95dd37ef66118b81fe0ffc508d9ac1
-
Filesize
1KB
MD54934c5d386c6cc8481d626000e37b890
SHA1caf9177ff034690ab9861e8f2cccc2c5c397c2d0
SHA256903d0e6e1f9c0adda30dedf63b03f566c94a97e1944857b95638fba0d88afbbf
SHA5125fb60f402db7833809a6e1e11a87115510692a93e76da7b1a4d100e53f5e635943a9111b01c2e080bb072eb6e3983bedae91475806e49cc83a42eabe8dab9379
-
Filesize
1KB
MD57b78db1fa76f0bbfe75c813e0c7b6291
SHA1994a4b326095c771e153394036526b386991f9b5
SHA25696f9d74d004696cfd573d475feee68f265ad718ff22bc20be2d5ca3219974820
SHA512c0e37cf8c7f36acad868cd1b59155b01710cd26d5aa444ca25771ac822b7a000d599f4275ff67ce90c986512281284f2ba26f72c8ca9f8e816d2e635ba3633a4
-
Filesize
6KB
MD59f520ca02b400150b05289ffd83a78d7
SHA1404f5f17a91f46007191d7cae4994fa29f262a42
SHA256318d55fb0138956f175764d6b51227994a4d410378233cb4101a4922dbe23572
SHA5128f6f020ac006bacc4d7050aaef880355dbfd9395e10965cf389b60df7a137ed58831a296beedc06f7323327acfcd23f3874b9cc0ca5a00ad11666b2f126f2e74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ad0686ac-2f96-4e88-b7f5-9f335d967abc.tmp
Filesize6KB
MD50c7564ae6cf2a885c0e2e7d78037faa8
SHA10b81d35ccd72dda2478ce021ad64a94c7166cea4
SHA25687318f05552fce8b9b989be8520bfb947b704f7464d924b79156c764957ddebd
SHA51241e2af10b25a977bb21f3459a60e4cf6d20eed6e39cd43859aa42ebf88d8306dacd4fd31a34162c9dfd489c9561dbd692072e9b6ff5f5dbe2b928b6ed09d3047
-
Filesize
136KB
MD52b8ff8eec0db8e9293132b4f2489615f
SHA1d10c861af33b535dc33726dd4182b33ccb66c284
SHA25682f3fac76dad8a49b4f59afb13ea9bb607c037782705f78790bcb18f7d9fa71b
SHA5125d37c9eee5547bf935fb74ec3c7a1b24d097fe824047fa513cb3fdc051f3d4c7436d21209709ec1fd707d9edfd140a55edf1366aefea6db539ddeb88975d67b8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd