Analysis
-
max time kernel
26s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.bing.com
Resource
win10v2004-20241007-en
General
-
Target
http://www.bing.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133792655434055378" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4852 4572 chrome.exe 83 PID 4572 wrote to memory of 4852 4572 chrome.exe 83 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 1068 4572 chrome.exe 84 PID 4572 wrote to memory of 840 4572 chrome.exe 85 PID 4572 wrote to memory of 840 4572 chrome.exe 85 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86 PID 4572 wrote to memory of 3908 4572 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.bing.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xd4,0x110,0x7fff869dcc40,0x7fff869dcc4c,0x7fff869dcc582⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3752,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3404,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3520,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3468,i,3384351900669625413,15136395818672943329,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4092 /prefetch:82⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b7092ebaba3887f5f442cb7847a804e3
SHA1e19906d9f781e12c093cea0554797c9c83187873
SHA256b292a48ee40986132d17bebdf47c2632632c423790746974b484ca894afe4606
SHA51205695c8c1d4db49e38e261a2c78f597f55f4f4f76193290c8f67690852dcec660745809d61d52fedbd6f71c551976e0fd4876d2e315ca21c89fb280ebb971645
-
Filesize
1KB
MD5fde0648de496e97d91a31449f069741f
SHA1dc0c395def985789111898d60fa12ac5d448be23
SHA256356b1cce7fb711c3bde9bf8c96ac908436060d50c4a81817f4c3420e35a11dfa
SHA512328ab9453857611388251f8da95f73de1d25cf5d2633fe59ce77c7043d1ab9e7f265a62ca010824056e91ffaeb3e7c4f0ccb12ddf8a602ee059b23810bf36587
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58cd99a4b581ab4f2adbf1ea0e1f0bbc2
SHA153c5d6be106a225414db64ff291bd14caf8a1e94
SHA256822a8a7a181cce1d7e4e6cabc1a490cf6ee5d29522444e6338acae6df48a75f1
SHA5128c5d8957c43de6873c2911d16b1511846ec8ffbfac7366fbbe781f773b28d4e26950748ba46d414d3c385625aef2158964dd62dbacc394db46f0855e18b1ed60
-
Filesize
9KB
MD545144e3bf5bf068f78aa21ff97255c25
SHA1ff4d40f7ea19c75ab55041789a99a34d0da41e28
SHA2562f148e487f5378a66ec5a2d03ca6950d5eed16c422a6786f0e65574355057049
SHA5127d1656d317f4d2c406c78a6bd71dfa298c7c6d80ee80776ed7c3d7447770e0cd7b78c9ca53fe3b6698b466942fd5e14a1c9101ce9d44fafd8f55d6fbb8f20f5c
-
Filesize
9KB
MD561b39b3a18c95d1e00f8d445b7081286
SHA11569b2243fa8665877dcddd2ea6381902a4b2ed2
SHA2560470bdc2324aa57d41e48b3bd4bf79acd3264b5ef6ef101312dc208a9bde93d4
SHA51280ddc97e1de933ded5ba40843bce3584f3c1f104b5fc2484ef8ee9aabed060ca8da478e89f93f6b642a758569c581bed34bd348ce2d609e90b6d1b03e2807022
-
Filesize
116KB
MD5d4eb1c6db3375eda919c0c74a536b58c
SHA18e9695879831f3c9b098902f58b32c7e17d8ba36
SHA256837dda45c44d2e731c74eefdaffebe672c7cc1522db33f7273708458850cdb94
SHA512814ea6e17725f280fa17a9855c6a5d3559c3b45c24d15e28ebbb735d890c2cd776de3ab58a10c6a0ab05f5f4854284887b6bba83be6caa93f4808e0cf40fe933