Analysis
-
max time kernel
300s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 22:13
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795519904519508" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 536 chrome.exe 536 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 536 chrome.exe 536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 2972 536 chrome.exe 85 PID 536 wrote to memory of 2972 536 chrome.exe 85 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 1192 536 chrome.exe 86 PID 536 wrote to memory of 2432 536 chrome.exe 87 PID 536 wrote to memory of 2432 536 chrome.exe 87 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88 PID 536 wrote to memory of 2584 536 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/images/ppe/pp-logo_x2.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa98a5cc40,0x7ffa98a5cc4c,0x7ffa98a5cc582⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2364 /prefetch:32⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2028,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4600,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4604,i,11254991277103770036,6976592621602967959,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ed91b9452cb519fd10ed7de552398942
SHA136f3d99d6ae62154017fc9097a38a6a0370e27e9
SHA25605080af536f7406626b6140b7bb929a351b2561114a07c5a276d66b1ad1028e8
SHA51231aa9811e6476d41cfb2ee7bcbd3e9ad3069a98b9c1c121674ddd4095509d7ccdebd0a988551dd0892d9f58e97f406303c58ed8cf603e71150bc4b71899468e5
-
Filesize
1KB
MD511619e33ae33735ecf2d8cd053e85f27
SHA12779063e9394b89d6d79efc17e3cb301163049e2
SHA256f4e2aef9a8e11861908ac37bb9d76c0d37f2a8f064d30f2745cbe9a1f962cba7
SHA51286d35125afa2a5fa791cf0ac679d3e9fc7e0d4861e90598912b85064f8b723794615e530c72504e88f0cbbdde7c412a360ab33a2ce197d4a9e16088ce1564f95
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5af208631cb0d767533fb70587731f016
SHA14425cd72a1046c83e07611cae1a8b58e2fa37bb1
SHA25664c3e48ff9637f315b1df7a15d401fae8ba3e1d46268b236af851204e207d699
SHA5124903210dce974a124aeb4320c2a16e5a558a39d7f7b581ecbc18a18aea9c760f654c06e9e5df2d3e49af044a72335a94952452cb9b56a2b6094850edd27b6c90
-
Filesize
9KB
MD5d371fa7470c27d17857c7ffdd6dafdfd
SHA15f500338e2a8962bcb5cbdb11faf19d4cf83f77d
SHA25694d15ed4d208862977e48593d197b05218bdec19c3486a14e1a83909b5f5efc1
SHA512af55dd0e05d7dac296c10627e402caa1b9cf965422ffae621fc430ee01c5206fb9471c51a7b10b3820280fc96d3959cc57dcd6154dac7e437ed278985519f8e1
-
Filesize
9KB
MD540e3ccd2bd09be15cb23b2ededd1d30c
SHA17f764592b783c2b3d021485964247632ffaab132
SHA25697e34378f2a8274ced99491631c2276754466032bca2e89615c6f8bd1480b7ba
SHA512c7137c41502b9b38e98f3aeb6ac25d583768ea11de908f7aa5b9e712ca4289093efc80a0c06858849225e91a607ef53a29483dd207de5f3ca2b25df73edc7502
-
Filesize
9KB
MD5e6408c825c3de6ca1175f5010238e0d0
SHA17968f72470d38e025d7bef637a8bb5352f8d6cfe
SHA25691e40a18c71ae84843962bd94acbd000ae321da7a26c6c98f41657b18fd5c641
SHA512087069a2f7689c1acd735dbe9f45e4c7954f7f5fd745c2e88951fd03170eb8d71bf397ed202eb53b46903261cf97a345a3affd63e598c8d1a11b86f3be9f8cb0
-
Filesize
9KB
MD5f89bd6365b75c42a51861bbd2aff744a
SHA159f3e37f0408fbc9c5b6d1ec2dfff66949c2817c
SHA256a20c3603878ba96af582e00b10ef503ef282d4eb3b444224b268b83ca2a3c0ed
SHA5123091cf8ccce2df6626b9363002572ecd5ac6a3bf3b269a10aa411bd70bda519933032c8291a2cf290622c63020523390d3976483ffd16f7e793e298c6bd24474
-
Filesize
9KB
MD5d864c4d57f8ee43d76eeb26bb4db5130
SHA1053bcf533623b07066ec1f17d2d021aecc036be0
SHA256d7e254eda153d9aaae10f5d27c97b2605908c4d0cd6df1128523d5551fc70d13
SHA51270fbe410a2df1bd5003c0134182fb6a47acc97f01800c216b7e92af6e148b469b50fc8a109308c7a786230b81d76c66d32769186ca179f9daa34b3b1383367a8
-
Filesize
9KB
MD558945abd312ba674436113120d115662
SHA1996386851ed5f1fff6f33e93a35a48a4137a85df
SHA256ca8adee35c703842d9dfd7682ba3bbf6cc074b5dff56f76df2a82482d5ad207f
SHA5120a1d95a8ea3aed1a5b4ec41b7ee6e5ed543d74f5dab8d2c7615fcfa3ac9e0ec6449c11e14d50a86432707d420400496d83a599b9cce7c12c58ef2db58490cbf2
-
Filesize
9KB
MD571ad9d30fb108a8cfc87759c13d09ce2
SHA1c98ffcbd7d8d465f7708130f49e844db36e76a2f
SHA2566b35930c452aeb39630c41bd06160b01f172ab793e9a100afc2220f3fbac3b25
SHA51255d96bbb680725acf71c839a96470b923f483edcc4f49e1117e3793baaa040e955f2e3b4aecd3ec0b09373b9fafc37f4e787f5ca23a9a21b70d016c92ed40c6f
-
Filesize
9KB
MD5d4d4ed6ddcdaffb66e2a0863ce742e39
SHA1e3b19b5bff776346af38fcaab17a864b31d9744c
SHA25620631ea797abba9addbb9c09c19ed56cd046db234cfaf40c1205326708212e6c
SHA51228b11cce4c18166c8f70345ea91e399246c45e378cd4a7d38609921640cc6a89227abc73c200dc09279b78b50242ed839d5aa37de0021f900bef5f5ca93f1157
-
Filesize
9KB
MD59888735ab4cb7f53dfb3898dd09fe504
SHA115c74f601d81746f1da0d92b636dc4951c7042da
SHA256339d345ac51da4f107706405b4ba91c473bd807476a42ed666b57ed20715a1d9
SHA51230fcdab57c89ec1465ec713758301565fb003186a0708a4adee4c5eb89a2d015e7fc5f32f53ea0c6b13ec6b403216f8c1b131e8c02fddf9dfe28cc3853e08a4c
-
Filesize
116KB
MD54bdf49ff98ee356f3f1d7dc91ad539d1
SHA10ad3bc31161b69aeab5808ca6443d31639bbb1f6
SHA25696cab60b2a5298264a42fc80c918bcb1ec8edf387ff07506af11a7f4b64e0478
SHA51225f5e81754db641073c795f37b66db314c5c65ddcb816b6250ba10673933592f360f92941ff6a1a645b033feed996fd45a3fd48a5d470386f80914a61d3709d1
-
Filesize
116KB
MD57535082a75a12d545e0b799049c0fc15
SHA193279f1ccb931212cfd729a94d0d3750eb45c3d8
SHA2568348eb551341e48542f2e26e63d5dfda1fc5898a327271f883ed078d1960d389
SHA5129cfaf99d88274da61a5ce8f92001b878eea1ccb8c298eed601aa2d9a853dcec10b099d2482c5886499d9c0bcf8e3a7b6819c687df4807212b6959402468521a5