Analysis
-
max time kernel
25s -
max time network
22s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 15:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://unlockcontent.org
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
https://unlockcontent.org
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
https://unlockcontent.org
Resource
android-x64-20240910-en
Behavioral task
behavioral4
Sample
https://unlockcontent.org
Resource
android-x64-arm64-20240910-en
General
-
Target
https://unlockcontent.org
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876500761731249" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 6140 3156 chrome.exe 82 PID 3156 wrote to memory of 6140 3156 chrome.exe 82 PID 3156 wrote to memory of 2572 3156 chrome.exe 83 PID 3156 wrote to memory of 2572 3156 chrome.exe 83 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 2728 3156 chrome.exe 84 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85 PID 3156 wrote to memory of 1852 3156 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://unlockcontent.org1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7fff48c9dcf8,0x7fff48c9dd04,0x7fff48c9dd102⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1584,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2008,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2372,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4144,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4288 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5264,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5444,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5752,i,9155320422551255206,13088028349745173276,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57a6bc5b78a46dde40db7ef74c4fad537
SHA140f3dfd1f29478652b18014d51e7c6d76396301a
SHA2561c17a6e41358e25a2ed6a95b45db55ddd1d2e0fb5b762a8b1a006a1ebda3e19f
SHA512f044ff6188049505938ffdb917be27c2136c1b0311bc9814d946c3cea28b4b9bc214315e6a664383841ace5f4d2aa531fe7210aa3af659caedaba3a4e298b7dd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD5764d23102900fe5cb738a15dfdd932b1
SHA14253b3172f9ae06f65bc0904d4298eda15a1d5c6
SHA2565f6ae70ccf5e4d8123ec71bb502ba129a01450a21f5426d27d110aab481b6df6
SHA5129e34ed243ff902746d551e6a1f820bd3bdd24934c7be5f877ceae7779f4a27b3111625ac8e4f988a8e318edf5203dddb07b3fe59a9d320315152d9f180208ee9
-
Filesize
15KB
MD5b8469d4794c4569204ca8af549b0c0c0
SHA1d33a31fce1084b1d4a254ec3573d3acfcf4c1d6e
SHA2563716a9d245ad9185cbc05dc231e96801a023e097313e204809d4474eea5e9774
SHA512fa1db6846603e3e819ea50992cfebfd42c6d9e76452e759aae5ee12537f23ac6e7a150ca3d0a92765efe00b1017f2bb822037613741ea2d3593dfb87d2c79dd5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD585530c8b4d84756d23b4493fd40762d2
SHA15f54bdf0b2147161344d827bdd7e5fd785bf5270
SHA256c2506c47ad4b0de4ab9a4bd4ecac7c240e4b137b326a2d6885f64a5ebeb8e1a1
SHA5120aabb7bc4ad9467154ebfb63c3d1c2e013f1fda39bdba1e082e686cf4f2d2ee749654057a86038620354895a3f6b145aa2ff4f003aa866ced0efd87cb7cd5722
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580b46.TMP
Filesize48B
MD5436bd8e609b80647689bc1d77860c3ed
SHA1e7bf2f0889ec8bfd4a9befbc71ec6136c4a70ae9
SHA25664c44960fb9098aad1a859fab5017c5238c68ef58ccc97b1a184ddcd1740a47e
SHA512704b1ee566eac936ff55bf8f9d1fd928ed45fc5159e52b772cfc36a2ead43d84494c8a0ab06a7f4cd02c767969e7d20ac4a89197929286f5cdf3b69229b4d1f3
-
Filesize
79KB
MD502a2b9bef87be1e9e4842600c8604a70
SHA10a04184ba7246c37d2d49e700378a1847bdcd4aa
SHA256a224ddbc270f7610a43033f1cac1dd5977824387fb4721b23d3e9e4b7bc85904
SHA512da28c343dfce23c26d2a5e5ccb991a8b27ad421e906994aa46db685a6fda1264891f2f296e6d6659ab46c0779a319bab7dc0ac4d696756ea5e3b14336fe182d3
-
Filesize
81KB
MD5b7b077a3f189079e5e85e38813d2c16d
SHA126acf19fbc5bab4665489eaec8429e93f5b59bfb
SHA2562ba0d7d886ef9668bf06f578f3222e9fbf56682e57ca2b3fb02b8798d4064ba7
SHA5120d5ede50a61a67e6c3bc37179fb98ecfd6365ecfa0cf6e5f2662c31df4f57db6b3edddbd85dbbdd51cffdc67c2386a0878a0de958d5fdc3a64d15467b7bf3fda