Analysis
-
max time kernel
21s -
max time network
9s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 21:44
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771311104118615" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 5060 2316 chrome.exe 76 PID 2316 wrote to memory of 5060 2316 chrome.exe 76 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3732 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 78 PID 2316 wrote to memory of 3720 2316 chrome.exe 78 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79 PID 2316 wrote to memory of 112 2316 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aka.ms/AAb9ysg1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3a4cc40,0x7ffec3a4cc4c,0x7ffec3a4cc582⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1752,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1748 /prefetch:22⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2140,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4100,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4276,i,7470625487594597862,3080199412537473722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD564242c513470b7d50bcaaea94b1742c4
SHA164683d55f77c1e324b3ecacb89ab8e9f8b128f32
SHA2565fd532015cd14e1919b6687370669d2a8749cb0a3f5134d1b7c8aa795feda37f
SHA5124739ecc96fd58282fd0efc65b9aee8009b7bdce740dbf8c7892fb073d4ca4cfaa61f1535052f40e8d06aded5cb664f343de69dc0bc0519cc75b0cc6f1741fd6d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD55e134aaee4b7afa974eb316e88789578
SHA1829c59c35ff8c15f80acb2f22f62e92f641fbd26
SHA25660158b6d1415b6822bb8b15244d2b89a5d8b8bf4cc00c47489abd3c06d661562
SHA51221b0f933b3a94b8e5b031a1e15348abd5a301e2283eefc08f0d483c5c80ddf86840a5228414c8d8e928b125d53b519cbbfcb880d184108627edf219c7c55f23b
-
Filesize
9KB
MD59ee983eac9075b71f06eb6cc122efe3f
SHA1d03a5ee214a9ad37f402ee4df30094ba65dd527c
SHA25615096bc251ef4000625569ec34f5f9b10cc183e415dde920e014464fce52932c
SHA512b57d3703c99ff0f201a2d26c80b3c6ca3ac2a48b0177c34ee436a5f6f14a031d8b22ab40d310435b7b57b12277943db7804595face8f47411bd1b7b2f35fbd36
-
Filesize
228KB
MD5bfc136b5a2c7d31f737f11cd05ffbc38
SHA1184324a0afe798d40faae9bf7a9e9f0d2deba2d2
SHA2562ebca527302ec74ad4f9138497e7c8fdd4514691e14eb9ffeee55dae9319cae6
SHA512ce75912c3037042dec930bc5607b79660b7b1a6d9b4c759a69378192daaf444c35daa79c547068b844602b98a1f1fea8a2acd77e677856fbc71250c5bece6df8