Analysis
-
max time kernel
33s -
max time network
39s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09/12/2024, 14:30
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133782282563771259" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeCreatePagefilePrivilege 3036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3356 3036 chrome.exe 80 PID 3036 wrote to memory of 3356 3036 chrome.exe 80 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 3452 3036 chrome.exe 81 PID 3036 wrote to memory of 5020 3036 chrome.exe 82 PID 3036 wrote to memory of 5020 3036 chrome.exe 82 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83 PID 3036 wrote to memory of 4720 3036 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Book.woff')1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc5789cc40,0x7ffc5789cc4c,0x7ffc5789cc582⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1708,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4492,i,1437328726436869198,5198225359327179708,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD524af57cb2397f0af9fa1a97a007bad31
SHA17f43814a952340c6c3798283bc0b56ebf1adb83f
SHA256348ad18a82c2a58aa5332a3bfafd055f96ddd590bd69be8a8a7c6bbfda84a103
SHA5128a0a8dc3abbbddbb0073eab4172642a0885f162b1ba292cf596f3753cf4d03578908134ed7c51897fa5bb158b4a3d2f32c4bac8ec5d9ba551b4805d36ce7692f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5ad019bfd047a6a0443561c08d2a201bf
SHA165be8b437448f3ad411543196316d83fdce94bac
SHA2568af83200e7475d0485f53466b035854e4869d999aafc0d39977387182a43499d
SHA512020d5882699bd77cf9f32fbb953de01a9df2bbf05fadce5a9a6f5e8192b5a159bde3e66e995919ddb11612b4b0dc7419ed13e705009cf89d896323f167dd4b8f
-
Filesize
9KB
MD5d5028804ed6449739de478e54bc94981
SHA13ea0fe22c4463bf00dbe89676b33e58f22c66c8a
SHA256a014782f15cb9b088ffb60849cb4a98dfa517a0f011ac93cc00402a4f87e8313
SHA512aa1a5c28155bd22162dd14d2050f74f65ee2ab5728961f2e27690da1bfcc3798fe40f1cd31ec8a53c4e1feb97ba37c9220968d07bf3e4248abb9bf476ea68715
-
Filesize
9KB
MD5e98423633b58331cf19f13596b579ffe
SHA14c28cbd9120484cd5fb6f0127c1c32c359aafd99
SHA2564a30b43890c2600da2014cd84fb4405303b6829796eeb5cf09781bda9cc1e764
SHA512ad63ce23ca088d248470b342fd751b4b06e34b4d89cbd85f659680ae057a6159750601b683650c814ecd80d33da5c8881ca4d198e51ad357ed3f2a9b73ae21b9
-
Filesize
118KB
MD5383a78fa90789f8087aa4e37135b854a
SHA1d3e2ab32084fefaeb66993f0f80382a06665bc81
SHA256cc9345b653989d7fd60ba4a16f88e0554abb63dd50a8e3dced488c218efa44ea
SHA5129db7ae7ef7fae19ba58551ea632396805c5df59b8a3aab87007c66a308e4bfb995c2a44a515d830fb5cd71d96ed3d5186d2d009f9a77d6da09eddac2fbc47dfb