Analysis
-
max time kernel
10s -
max time network
8s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-12-2024 14:14
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133782272691039668" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4072 chrome.exe 4072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe Token: SeShutdownPrivilege 4072 chrome.exe Token: SeCreatePagefilePrivilege 4072 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe 4072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3780 4072 chrome.exe 83 PID 4072 wrote to memory of 3780 4072 chrome.exe 83 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 1432 4072 chrome.exe 84 PID 4072 wrote to memory of 3536 4072 chrome.exe 85 PID 4072 wrote to memory of 3536 4072 chrome.exe 85 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86 PID 4072 wrote to memory of 3704 4072 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/images/quantum_leap/footer-social-icons_facebook.png1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7fff0edecc40,0x7fff0edecc4c,0x7fff0edecc582⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,9729651656196312839,10716885088128547426,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b1e48b798e223f02149bbe1793adf7c7
SHA1b6e728d7d0494fc9e1c399d8eb6a340cef02efc8
SHA2564d7ac94127ec184db73e8266081e7d1bb497a1c865c50ca91536d17f5713a60e
SHA512988aae5106bd1f390c9fe7b285b7aed242793149c09b46546f8736b9f80d48506b0601580fd4fe697d76db5323653deeaf787b577ae1127076b8595b49d06dd1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD51905f35b653e918581b47664459ad4ec
SHA1bf6a52fa319b262bcff4a91a8d0cd01f5e62e1f6
SHA256d59f3623fba865905eb10169341af38361c225ba1f787e1e94dba90400043ac6
SHA5121695444bf68ff612af9bd7da8013cc53ec7778b9adc502a2ab120187d56399b69111fd3dd0e5796691afc62f2d675095486ca65dda61254c89897e4ec34db98c
-
Filesize
118KB
MD5167dcbb4cb046eca8dbf76bff7527694
SHA1f1aa5e53ab84fa06edee4e5695624815fe879b88
SHA25610e37e538a545ee7c498414b344a0e75e01fc100335050a5ae5ec2ac1a1d394b
SHA5128315277c951e59e3e5f0f7d7fc2e17355a4b71a96b41575f259970d6d5b96a7807dcdac5918f9e47da120b524b8cc12b13c74ddf33e4c7ab942d0826cbe8fb6b