Analysis
-
max time kernel
69s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 17:59
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://52f1897b.5648702dd4d5255cab645104.workers.dev/[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://52f1897b.5648702dd4d5255cab645104.workers.dev/[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133813511967012345" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 4044 1352 chrome.exe 83 PID 1352 wrote to memory of 4044 1352 chrome.exe 83 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 412 1352 chrome.exe 84 PID 1352 wrote to memory of 1116 1352 chrome.exe 85 PID 1352 wrote to memory of 1116 1352 chrome.exe 85 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86 PID 1352 wrote to memory of 560 1352 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://52f1897b.5648702dd4d5255cab645104.workers.dev/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9ed28cc40,0x7ff9ed28cc4c,0x7ff9ed28cc582⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4480,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3684,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4768,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3336,i,17982711390499364785,608433669766496234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58fdaf5eb604fafc9a6c6088b90a80e94
SHA124c4d3aa632c9f9bd49f54785be6dedf8c0a4f41
SHA2564abd3ce99022070dfcff34901558b9e78f24662b8292929d8bec8352a8183e8d
SHA5126198ef38e5c9859fddfd5f77d6a8cc003793699fccff6760b7024e638070fbcd7eb61c56a814bdefe4405ef639d69c9e146968a9bc4a21ae5465121f1110b142
-
Filesize
264B
MD510e4596fc564a59a93d1db7e3d8a89ee
SHA15792cbfed0bc7d19d46fd3923f54bf100c5a6b35
SHA25626bddcc920657a09b5e75cbae1a2b69ea011eafd821b6d0d5e479adb065e956b
SHA51221fcf8bef4566a619cf036396d7dc415c6ac2baeae9d464dbca2922bc535158575170a86903cad8e30783489b9bf4438553b155c43f4c6d7e97e63d016d54607
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1023B
MD57aecdeb20160f85c2944a3d6ea59eb43
SHA1748a690760e84d5a0ed528e8010fd5cc14b06fd3
SHA2561119b9263b5f310fc3689d6ebcc91012596847fb8ee812924b7eb43ca92b486b
SHA5125a63d5d1acc37840dba0b3d72c481c4f053f4789dd13f19536162d9481e3b8c0f3ad099a44b75a0ad07101fe548ee7a26d36a80ae5ed5755b4ea19cf5e5e396e
-
Filesize
10KB
MD5f6d4b240156b4a0b609dcf6bf38fd940
SHA1611e59008d2069cc130337200062f65110851002
SHA256268fbc52d7e3805c2d9efeb3c733f2b9522bb330e60c9ec8e47455b7795f172b
SHA512b9b3b4bd673cd013ffba39b667229b75dc1e3b3b4fd41a27a261056a2afbe21200c24add07c7fd6f168452a6fc96fe0bf3574caaf4fbfc01ea525c061fef1c5d
-
Filesize
9KB
MD53073a2af2eed19f02368a55f35a5d954
SHA15f3ad211c483989431ba2b567487aa18165553e7
SHA256d42c16be8b8b7c22528f8d40eaa0e7944e06ca8723ce86789fc7aa8a7fe0c916
SHA51247b44488014c0feb0759b3474f009bc1c4c91d7dabb2ae26d5af58a186fa6797e1ae3a3f9ec393971e4923657c0c24d4da3ed4d4caf3124b93f4fe2ab36903a2
-
Filesize
10KB
MD52e9d487bf7d3c8e560df727c5aefd9b7
SHA117ef0af816c68f0c259d5ff8d30d248126362363
SHA256b01cb2e1bb2ee1e4cb4538ab87ee3cbdfd8402755c84deb2e4f0b86afb12c2d7
SHA5125c9fd93db5b8434cab75b2d9b8f11f35a3d43e10a7bd5ff8bd428c5e090c1dd04280c4585d36ab6f7459402450d8c951204ce454fc51e88dde06641b4f9f187d
-
Filesize
9KB
MD58bf792c1c47fb203b141a12feecf1307
SHA18feaf9a0cc9270228b8157d9ff1771cee3e59bde
SHA256b2123162c3fb964cddbc211f8f4fef6f6297ab55964d35d4b467e4929fd1a2cf
SHA5123f0dc89f1f8a9b591ef1b3f3068ab9a3f242dcc86e2f48e96764d19ae5264892a6c999eb15051553b158181a1cbdbf2989964a911b87931660648eb201432a6c
-
Filesize
116KB
MD57fa1c819fda3f14794ac9fa89ec17cbd
SHA171c36c9b9297ab5106ae1e05c7433b795d637392
SHA25630afb87950ab364e78d5929529edacae0b5f740c6c4104ab56eb17145e3a187b
SHA51210ffff308ae544394eb42b9adc773def89c89b6b5b9af9dd731a50666aecfb3d57efa3be7a30bcdcd9f15e18b80d06c2d4a1fe20c546c74f42b18dc4901e6b97
-
Filesize
116KB
MD54e876600a5f68a279272502d7bf74baa
SHA14e918ac063acc03e3715014980da21e93e01e7fa
SHA256fe9568ad291884eda48833a74bcb7647b93332f425542d0fb65d404d959ee548
SHA512e751cd59544fda2b55d25b3db8ba8dea09e6e3d3efd99d356d6d6729bee4ccf6c011f85dcf700039190dee6b8dc69ddebcacf7e351f70c5e5b8c17640a0aed12