Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/10/2024, 13:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.file.io/lQA4/download/sPHgMYIUZNbi
Resource
win11-20241007-en
General
-
Target
https://www.file.io/lQA4/download/sPHgMYIUZNbi
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729543080964258" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 548 3696 chrome.exe 79 PID 3696 wrote to memory of 548 3696 chrome.exe 79 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 4520 3696 chrome.exe 80 PID 3696 wrote to memory of 2172 3696 chrome.exe 81 PID 3696 wrote to memory of 2172 3696 chrome.exe 81 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82 PID 3696 wrote to memory of 3476 3696 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.file.io/lQA4/download/sPHgMYIUZNbi1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff72a4cc40,0x7fff72a4cc4c,0x7fff72a4cc582⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1824,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4844,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4792,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4956,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5340,i,13340179097135857453,12516042651961038537,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f74f7a80448accbaa5edfeae656ec89
SHA1f37476177d64135cc2a534de0aabc143dbe16239
SHA256cde868d44317e6aee7864fbcb687a92e67e9e2f2be6f797d1ed3250483d26686
SHA512fcedcec54c5fe9c327717b7d01887b2471ec2cbf7c8726f3a42923d98eb766428223f9d10936de414dbb6876a3f80d5bf347504d99d8fd22b2937fa261edfe58
-
Filesize
1KB
MD56f0caed48a2e3a25a8947a87f2633e05
SHA16b7d128739ee357ba3cd241efc0821cdaadbfb6c
SHA2567c81cdd6b34290369a5e06879b841eb86d3aebfc0bb2ed2f8fff5e67dfe88e30
SHA512387d3931b9f46f3c5961170fb477c35870be0bdd11d2d6827a23fa6beddea549911a0c5b91cea8df49c49824f6dc6c82ea936931c9a2231ec92341b6fdda2b0e
-
Filesize
1KB
MD55ff10ff4972983363abbcc864279579d
SHA1f344cb4d6645118a5f6329926e6c7446050fadf6
SHA256090737c195e80d128d2a8c67840a14d2d26cb707ebb2bb0f99969adc557a2611
SHA5125761ef06b30c1414211958f6af5ea52f1b2313ca03eb88a5c3ded881af015ab288771f335d2517ef13ceded2df3774a8732805afa8f16be71d90b8df7437cad4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a8cda4d1-bb83-4c8b-a174-11dea95a3dcc.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5a04660c31e2ff7b41f9c042b359362bd
SHA126df919a2d9675c1cec847d1a715aac7db9860ac
SHA256536eccd834b2718fbe24ec8d5cf3eb511c397fede8fc390dcc997b4d53e15154
SHA5129b37a7207b4d9fd9e80fae613b4e05aec52a21f64a6f5fe3fb980d0a677981e8345b139a4f391bb30a2b6b656b6da7a9f042073b342b006fbfccf9162d40cc88
-
Filesize
8KB
MD547fbe08851da50d742a970da27df2f34
SHA14ca48e25e06c8d713093765cd648ea243bd5b648
SHA256e3fd8142170c88e20ee95b6861811ae4c3b72085202d88e9904d4ec954f6c539
SHA512883103c0973d043c0bc9bbab869b5d3be9996ae6d1e72ec79496f8100dfb113ef0be24b4e96e7255c70b7c2f9147b3cad9da1ed3f977c1a4256e5bf717c7ecc1
-
Filesize
8KB
MD53aeb931da67d16dabacf19943385bf6e
SHA145cf3adb9d60e2f10de971d53474eac9d530044b
SHA25646657e752bf7a31b240a2209c99088fa5431e35fdd71fe981f29adf57f59a230
SHA51296af50f81b7aac6670922f96605b5e01e21eaa747f8168bb950a94fb21740ec3102050ce67746a43f8a34ad24f4d95f94aba8c2db14880a45a0f74a8a9ffb8a1
-
Filesize
115KB
MD542a7bf07eacb58022253dd425ab89e0b
SHA1941a57a04061f3758a97eed94be816e313f79b60
SHA2569b97b35fd4c6e08afcf9f672db2757978f6f1132bbc5b6930cb69defacde5188
SHA51278a6e4e2b10d41e6aa8d1e1940dda534f3055ab76ce5b59fd9459a48d6bdae29b1085c34b8c94d108350a6a3fc2f80be9681e0a25d012ec3e896f2cc016499a1
-
Filesize
115KB
MD568f454487749bdc42cb24aa22f7d5676
SHA195edb08d6a82e7a972eba79ff409a27075a9bb07
SHA256f6ae8ffbdb896726f9a23a96fda69cca7e12b613479b2ee8701436c6d6f167ae
SHA512e6802d77b01b99667b095f82f5bfd08b3dfcbbec9e8c6156bb566ad1cf3a0637cc786a0d87e2c195d1f55db48a896864abf62033b6879de76db00b67a9b51e9d
-
Filesize
115KB
MD58bcb0b161a6654721b387a58c87bf16d
SHA18a05eecaf58bf5cc94855b94d423c0ba5d1322d0
SHA25691bd8caa1028b8659d09dacc28220691e050686d57a7f428de7dc114b37f35c1
SHA512b62f8197a252d00bd1fb095a59dbeb4cc94157ed30549b6c09e94ada6584976d6f547046ac0754409f80da9d8b3a496d29cb4da6dec5cad6b012aa3d717fb458