Resubmissions
20-11-2024 15:08
241120-sjdyyasrhm 5Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 15:08
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765889518029933" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 1524 chrome.exe 1524 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1524 wrote to memory of 4244 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4244 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 4844 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1848 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1848 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1872 1524 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.microsoft.com/fwlink/?LinkId=5509861⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf7a0cc40,0x7ffbf7a0cc4c,0x7ffbf7a0cc582⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=724,i,11536811117943334238,10599494887139442438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57a0506532a527c827340f385dfd9aac9
SHA1369b2ee736deeefd5cee5089edd45c0c78d40485
SHA25631fe604c9a189e2cc21525196841853fe727fe28bc761265988124823c468f7f
SHA512064dfbe40075161f9972f4f6786a19664a4560aecf0107b51ea4051247140ba305123185b514205b4eb2c96f009e91d5c9908e759f70526918189d1476eaddd9
-
Filesize
2KB
MD585c9e34449d1bcc11bacf4dd9aac0243
SHA1ee2f78814f2636c51a404ef7d485878c56a10a0d
SHA256142d496a1ebad65e9dbadbe741aaa90aa3ee4e492f8e9695156f4072e7ede14c
SHA512df03046a53e1f2dbc32b19f356451876547500ec87f63dc0f6f72cde915be1d43e206e0b6c2a83919a8e6ec8449daeb12b96067776aaa7c1bd9ab1e492ce130d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5fcdddd3076fc796589f1e88069e8bccd
SHA12de618dba5f4904c08eac88520bfd1737284349a
SHA25659da854c3e2ee4333ead94e260bcdded2bc729cdc9b4279fd2e499dc35c2c004
SHA512e898b1227282240035dcf9c154b84ca92e9e0b5be2ca52d4bc1a56b54fd1ecedb7cf82ff8f8978ce814fef04c55e80b4686b275a76e2e0d75c5a2f8dee3f56aa
-
Filesize
9KB
MD56272ab54e87055b6f3be665910e273cb
SHA19802ef25500dc8ddaef1264771057eea82b49565
SHA256438a6950bd612d3977f2d0d62adf57992497829acb99cf0097157b8049a1b996
SHA5123df13c5b9dedf0c64943a891cde117a9aaedab50999b91a6ad5a539c3fb01177d82ed0686a5378ed740badad73c4575fdad5189711b8a2a1816a33138f95d25a
-
Filesize
9KB
MD5553871d0b56c36eb1d2baf3288c9844f
SHA16c959592b232708c2f7d273f9b28735089bae01c
SHA256baaea5734d248adb343557389fe4c29f4ef64b50b85754a91da53f3558865fa5
SHA512b7c50be59a62998293fd927453d78eb1604c17b1556217c6d78499daed5062c78734e748eb10cc68f04ad4128a7cbe8ee2171d28302d1d69f55caa647ae909f0
-
Filesize
9KB
MD550dbf3985ac92f0aeec0cfe3a4a2f77b
SHA10e6b4d990f4683845e606cde93ffba5b1f5ff364
SHA2561df0cc9594b047dc1e69f46379dd42171f5998a17f07cebae73a22933760198b
SHA512f928511e02db139237094099a0814082ee35ca6672cd9d362ffd1de57329bc79e6eeeda745bf9f3c4f2a0c2e277c06e5595294025a478e8ad5025300ce729781
-
Filesize
9KB
MD5adfd3f8531863a651b301db5448f6dfa
SHA1d0aea9e936f7a06627e0dbe296127cd26f5b5dc9
SHA256ba52fd11a653b9e33dbd48948160fde1cbcfc6b203df39efdbfe88ad11ddbe5a
SHA512f1443966890940b13b874ce2203314061aded98378c7a6256c55c57dbd4241c8dc98bc5295c24fab70e53f155b3b6bf907755b07d1d30de5f1681d780daa5a17
-
Filesize
116KB
MD5937830ac6bff3f720a38c5442ec6e02d
SHA11bc8653a312f60d1afe9ac7a58c5cf962250ffba
SHA256fd719f6cfedff848a4c318c4b45f45cd0e4d00acd3791ed764844e0b80686ed5
SHA512e179fac8290bedc8e10a88e8760faa5cbd66103f4bad1a6a5b775fe31c9d84a91baaa516c7b060efd28486cdcc78a4ceecf33929a25634321d7eb65db32d3eea
-
Filesize
116KB
MD5f74b5d25cc8cea7ba0c5fbbd6935abcf
SHA1ea57b01b82d71a66e2c4762342205d13cf4662bd
SHA256b1e64d47edb1e312a19e9911e6b4e94552f52f685e96d55749c67c153bd78c53
SHA512bfda02f1ed5b70695e9c3c132a8089c69cc0529f5e71085d82d17e4c0b1195c8f7070abdc162a50ab434768ebe79baa7f85e91c819a4a9e22a91c27ddd115e59
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e