Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-12-2024 17:36
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133785849780249582" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 chrome.exe 656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 656 chrome.exe 656 chrome.exe 656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe Token: SeShutdownPrivilege 656 chrome.exe Token: SeCreatePagefilePrivilege 656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe 656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 844 656 chrome.exe 79 PID 656 wrote to memory of 844 656 chrome.exe 79 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 3704 656 chrome.exe 80 PID 656 wrote to memory of 2688 656 chrome.exe 81 PID 656 wrote to memory of 2688 656 chrome.exe 81 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82 PID 656 wrote to memory of 4828 656 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u.to/_S0QIQ1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3d2dcc40,0x7ffc3d2dcc4c,0x7ffc3d2dcc582⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4356,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3344,i,7269936472102595071,8757966472763924682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4344 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e06e352f1682044ebd170f5060faf1de
SHA1bd03dac42a0794eb98594c186c823d0e0497db9f
SHA2560ac6e0945fe9dcb8aba0e4afe3a174e8b1b7260fe5834b615d3bfb68b8c978d7
SHA512b105f1729155aa84433e002a45fdf61f46b1d53afbf4108e1e2df3247b57df489feeab1a53bff26fb33f0be64259a3d6cda195ddaffa8ad72c74dee53185334a
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD510aa6a582016cb5a4fa8d60206dd8740
SHA122c75400123898f94d003b595794ab92e6994792
SHA256800996de4519b8cba5a79cc5f5dcc8d5fdac707970d7e59aac1b7344cefde115
SHA512937752a2f202bf7ae59c1e23d098a0149b87fe1acf6a7a44c66a42f5fe66fd80e0ad6308d6764cc65f74deebbb4b7dc1c18b723b4ca6b2fd733b20ce997a0994
-
Filesize
1023B
MD545c7293cda1a75f9b95d4c10bd78a6c9
SHA154f36218aa5304bc21de344ff510114ba07bd157
SHA2567992a548ce86c9d9761665a97a7ab3646c782ce8429ea86e13e67ebe0715c280
SHA512751ad00165ce0f9f1ad930352588e414bd2572456cb76ed89df334c018d6e632612d5ed1d25be8aab0ed645a90d2f1023561897a73bddbe43c967bea9371c32c
-
Filesize
9KB
MD54a45473a82657ae5e7713444af446262
SHA1ba300743baf423dd5f89d725f5bc3cc503cb5018
SHA2562be9788452556dd22728fbdf3befea56ccba58381de0d048ee21d7b94bd99a81
SHA512106ca9f2032be0012f49908437e4f9b62cf4f88dce4f27bbfd51d9b844a95fb9f75188b8dc1f39a42041e5c0bcccccc807673822e31f40c208d1b92e11e7a334
-
Filesize
9KB
MD59427f84dcc5c486ce3af6b4eb8e285f9
SHA16199ece0124afad5fd470835ed5097ccd51bf936
SHA25653112f4fe9df56c51a7ef8ffeebcbfdaae7f3cf3f751c7f32f3ab87bedc655f6
SHA51294c2f8ee617c00f13915b372a6213c43900bdd051a78a39cb5785cd70b3ec0aa730ea5500eb239d4fae0bb144b139fed5bc72f8e0c52957753c1e550324c16ef
-
Filesize
116KB
MD5f5df7b40b8ddbd76bdcb7ea041a5c230
SHA1cc99e816452293380df3aaa623447d70c99c7e0d
SHA25608162cc308e0b74d153b505d9b89fe9f9061a87a829efc6984eb58e044934508
SHA512dbebd7ad626f157d552ceae0b4fbee4d3364e54e34ca85ee181062a1ea621f0d470ec97b8a76be77c66f31ff315c4eb018a6427ee2e05fea1c117b1c94e3330d
-
Filesize
116KB
MD51ca57c65b546d34f3ba177ec25fd7e2c
SHA185a5b15e9487221d4e4a6534def96a1aee8c54f6
SHA2562f841e7e18791d770e535e973a487f31adceebdd0de8cdc137c72a06775d3cc7
SHA5129719a78b8f5abeab0c802a9db0e62ecebeed2f8f0f409aca24eecf55d73e2e5718a2fa11db355daf7e5a0ab83c6803086498825181ce5c701c1c9b78c76fd08f