Resubmissions
23-12-2024 20:52
241223-znrh6a1ler 123-12-2024 18:06
241223-wp8bhswrep 323-12-2024 18:03
241223-wm463swrav 323-12-2024 17:00
241223-vjbvpavrcq 1023-12-2024 16:51
241223-vct3pavqbr 10Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://is.gd/CmxYJL
Resource
win10v2004-20241007-en
General
-
Target
https://is.gd/CmxYJL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133794506091336104" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 336 chrome.exe 336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 336 chrome.exe 336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 336 wrote to memory of 4728 336 chrome.exe 83 PID 336 wrote to memory of 4728 336 chrome.exe 83 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 4772 336 chrome.exe 84 PID 336 wrote to memory of 3748 336 chrome.exe 85 PID 336 wrote to memory of 3748 336 chrome.exe 85 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86 PID 336 wrote to memory of 3232 336 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://is.gd/CmxYJL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4855cc40,0x7ffe4855cc4c,0x7ffe4855cc582⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1808,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,11697606244781466958,3809385279310697293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4672 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5585a7e254383834c06d855bf989876d7
SHA1ab8cd935f82d78fc138214e7ba999ae21d59a08c
SHA25614b0b4297ec01b71ccdce4fe8b8c408df4ed53a4ea67c203a6c034b47bc48f2e
SHA512f454875906b62f5e721fcc5f33490341ae5a62c240516a6ee8e0ca468ca182c8b1830f2d8a41e89dab73c8653cef1cd67179dc5afd0cbcb3fc6066dd1cb3b038
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD55353d622523893378ad95c5d3249aa56
SHA148ec6b3dc084728b1465b1924d8ea23551eb8776
SHA2567a97877c5a234e75d96eb2aaa7de279b8aa5e206999854c42e436e86c67edee3
SHA512575bcd8f83ef02414cc999766579e805c0f1bac155d72f0b6003f4780d784288b35283121906ff4d5174d2fbec6eef1791e43e5c9c8f77754da6ffd33daec7c4
-
Filesize
9KB
MD59576c0f209a0d56798a823fcfb447340
SHA1b2681e45691089e02132f793035448fec477ab44
SHA256365b478b9f7f9aa646f0e38b913472bc3b467e74c50d4013d2fb6626994a3466
SHA5122dece2da5b057c612769ac37fb6e8f492b73d7b955849646a579a13405fbc3bf64d3eebd47e17861813f5fbe7620efe0dd456397e932ee995fe3676df8d0cdfc
-
Filesize
116KB
MD5cb78fe02507a2606808afc0317a0e3f3
SHA1aacbe428e99b05c4bda7dcf3c47ba28b6b226623
SHA256a65c8a1b23780cf510ea5a10db77876490dbe03b71ed41426e31f0312b54a496
SHA5120ce835f6273658ac3ffb01db2889b061329bad32e19e55063bc8a27bdafc04794c13fd05b97e9be3ebb4aeea00db579e159a67c19ca4e79e0c4214867c992791
-
Filesize
116KB
MD51276d809d89028a41515b904ac1ba5d6
SHA166213d66c7e749370152771853d5e50c6d4346ca
SHA2568f3cb471b18bfba445e20c320e7bd67925ee5cc97eae27f7f921c5c3d8b7fa48
SHA51257947c70f527ab16fd5267a26572627bd7d90f5577ee2c278099bedaf2257baf1731c21edbf5e358804bee3f645b0c6665e7f63c7f3562cdc2cdb6a4667071f0