Analysis
-
max time kernel
22s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 18:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/LhESWKjC#1Gn3yqj6BwN9xRFfkdZA5A
Resource
win11-20241007-en
General
-
Target
https://mega.nz/folder/LhESWKjC#1Gn3yqj6BwN9xRFfkdZA5A
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765159205171133" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3476 3188 chrome.exe 79 PID 3188 wrote to memory of 3476 3188 chrome.exe 79 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 3668 3188 chrome.exe 80 PID 3188 wrote to memory of 2604 3188 chrome.exe 81 PID 3188 wrote to memory of 2604 3188 chrome.exe 81 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82 PID 3188 wrote to memory of 2936 3188 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/folder/LhESWKjC#1Gn3yqj6BwN9xRFfkdZA5A1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0860cc40,0x7ffa0860cc4c,0x7ffa0860cc582⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2072 /prefetch:32⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4476,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4656,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5264,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5204,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5416,i,15824503855611428972,5278459154796786858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3240
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD56e30311abb76e26661dddb9239de11b3
SHA126cebd1b7655c13d79cb783f2efa5eb2dd3a4e49
SHA25631be442aef9e66edd6aad2321098c1b044d6911d97632837f0e9bb5515587382
SHA51285588ee64a8a719e9ff0c6f124b2978e108f29fce4c4c60cc150c3b107185e46ec2e54fa99c03fa179c7b11aad063c80af11109d6c12e3b89362e27f8e4f5eaf
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD52a9e852d4bee6e8aad6ca9cabb539b8c
SHA18bac5f1607e1e69284350f2930923e20a87d02d9
SHA256e6694f3fd59785515b5be5257730be571ca98b2957ac5c51abe07cfdcd839a9c
SHA512dbbd787587fc37032795d5dd3a6aa3a47ed8f35598e398fd8087160031f6306bba62c400e7f82212873eb5c0c4569fde5e8983081a5648ec6e04fa1ef307bd1a
-
Filesize
9KB
MD58ea9979b8131340cb2a155fe4359bdbe
SHA16875586f7a61ac6a4669169c1c93b05a32877270
SHA2565c72fb96b58d097c9b45732e4df936dec851dfe09e16457bb9e46c40e4b2706d
SHA5126f92adee6531ed4d8a4887ca0f8c9be8813ff28415f21c2348ea4d5de913ec64525905c394633bace9caedf1c739ab5425d1883cdc54eeaa85d1400bdfc386dc
-
Filesize
228KB
MD577f98684bd3304b36ad6128a76ae9a1e
SHA15539929c3e5c9f9962c33c09b70177acfdc4db1d
SHA256f51488f70792e3eb5722ee2a3f4135b3d6fcc40e9dae66101542d97f8cc75936
SHA512c8e56fba2c3ceccca2a06f42efbcb89abbf0cf46d2f638b340dba7c68d73c7d1c3a06da71198c21f1d8cfd354ab6291cbca69f4bd5a8cca182cdd8a81eeda6e5