Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 15:32
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640623963105180" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3084 chrome.exe 3084 chrome.exe 5032 chrome.exe 5032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3084 wrote to memory of 3016 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 3016 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 2268 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1652 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1652 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe PID 3084 wrote to memory of 1792 3084 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mysignins.microsoft.com/security-info/password/change/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7bf2ab58,0x7ffa7bf2ab68,0x7ffa7bf2ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4172 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3420 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1916,i,16013429293984105843,14079254184482357795,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\57399619-c44f-47ae-8681-9433b84eae99.tmpFilesize
7KB
MD5149c84666333293906e5a7c4aa5bcc89
SHA1ecc7d8a5cc2d19e699c16e6a05abd4e569c9054a
SHA25683a6f4aa17b9a001099dd29a618794d3e171500f3cd23aa7c69908a24d43c844
SHA512ec300a8b9a9fbaeeb83476148b269ec91ba89f20ab5e335000f31b73bb981adaa53f5fb9d91323c399fe3262e9177a417446c8d89316e5445225b2c3baddd1f2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000aFilesize
16KB
MD512e3dac858061d088023b2bd48e2fa96
SHA1e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5
SHA25690cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
SHA512c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD53e56e48f7b25555d8c6583a2168b495b
SHA18c4a80eb5fb15d0bd68c7731094044e3d2ddd06e
SHA25689c1ed4adbd625e1645f9d25ad23ebfbc439eeb7ee188c50d1fbdce0e566bf63
SHA512a5961d33d3b1c7c6f0eecf3ae3ab692092ba4d3910f1363b6583a6e727b3a6d5536faab48037f8bb7cc64d6455d318543afa2d6e6b14530b06aaf0e0b089a433
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD57958826dd97db799e51374c95fabf381
SHA13e57f6ceb0ad0f046675b8d5a6092619a18c7f71
SHA256318a34e4c20aafc2c39d40b5451c8e40c0d7f7c42c08cff6775e3f64ff3a9736
SHA512ec8ee6ff7f6697edd8c9e730d9c77f47438ac6ef1f31183996652c401385a30921016630bb108c7f1ec0bd2b5533d51f464d84612591c7ad290472d4c0b60d49
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5e3762ac39d9ff363583f2407a1d0f33c
SHA19bd50590d9538f3188700af42542a91a16460fb2
SHA2565f29228ca7e6775fa52db4873fbff1f878178a55feda0b59579ca9456d9a5498
SHA512e903d2d8a9021221d16fc89d0558d1116eee25efcd1bb371c482c3268e33fe73f5dc55940b237a425d3e9cc1c46fc8acf66342318b4f66264201770ec9006870
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD50dfc07e909c79b8b783ec57ba963603f
SHA15d05c33fe5732348d254246990002d1101798233
SHA256b1c153c179aa467ed0702d8f73437f4bc56f2595afb1718df5c92eadee9d0efa
SHA5121ad062636f597b4e8925890512ac8d015f23b7238c8ce1d0a74ab83aee324e474496ed6cdcc097a8ca64641e6c5b9b8b0159918ea532f3113b97b3111bcc5fd5
-
\??\pipe\crashpad_3084_LPHHXZRKRZQBTSBYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e