Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:20
Static task
static1
URLScan task
urlscan1
General
-
Target
http://[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766652231837696" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 548 chrome.exe 548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 3484 548 chrome.exe 83 PID 548 wrote to memory of 3484 548 chrome.exe 83 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2920 548 chrome.exe 84 PID 548 wrote to memory of 2160 548 chrome.exe 85 PID 548 wrote to memory of 2160 548 chrome.exe 85 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86 PID 548 wrote to memory of 3976 548 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec777cc40,0x7ffec777cc4c,0x7ffec777cc582⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:32⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2124,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3516,i,17403071365304663817,3546853317938655748,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cbbb75e04745b6552e6869169b7b315a
SHA1390e0dc51be72ff3785cb9896bc08bc60cc48e76
SHA256807c1df15cb39bba1840740338777ed3b2f6660bcb4ca77fbe7636578d049f13
SHA5129e62c674e4fd8d54dd975643dc9b419dd696a728a2e50cbda9242c4fdc386e29b3b4149927a04b3dcc3e3ffc43b9ad0d43ac45cb64869b107e7b0546cd8a8d02
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51181b1aeef4819c02bfe2f554213d24f
SHA1c71b92bcf5204b1facaaf398a68de53dd6844f72
SHA25607062c8a6d62820a77331329f323cd0cd92f054f1f69afd19e6e2f6712429598
SHA5125f64410623d53af50459da223b45dc0d09390d9a04e451efcdfb85f625db5226e9a247057d76920261b7b2c64105b8e5ad837c04b0c1362dbdbbdd733ab029ef
-
Filesize
9KB
MD55c152b0b124f92927a3a8dabb4b774ea
SHA179c6fa6e5844eac3a0f7f96d8b996aa5827d95ba
SHA25654376f5acb02565e050592f318b211a15bf2ce717dfe3c64e9a2aaf0d2512a70
SHA512f498a9e828e9806df367581f5244f8fe1598c3a4ef219097c4f4e7c9e41f7aee8e4d40ab3942d2689831f97223d5dc5adfba16e0a6a37c237c07523e717956ae
-
Filesize
116KB
MD5fdf5368bad456006b6c7b98e7945960f
SHA10b2bd2a47d10441932988caa423d35cdb28ca109
SHA256b5ab74791a95a4f935a9972b8fada9cccf6acf7a33de8b091e35ce72b53da38b
SHA51226505c106ac209a4287a5c618917c0d522b62438fd5978ad1dca360d42ea8deaf6905ce34fff904b8f3164869c21abeb040905a1851f0c72dac92ec449227268