Resubmissions
01/11/2022, 14:30
221101-rvhwlacfd5 101/11/2022, 14:25
221101-rrls3scfa8 101/11/2022, 14:14
221101-rkbdrsddhj 1Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 14:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://express.adobe.com/page/grPHJpOnWKVve/
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
https://express.adobe.com/page/grPHJpOnWKVve/
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings control.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1048 chrome.exe 1048 chrome.exe 2256 chrome.exe 2256 chrome.exe 3232 chrome.exe 3232 chrome.exe 916 chrome.exe 916 chrome.exe 364 chrome.exe 364 chrome.exe 2180 chrome.exe 2180 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 4008 control.exe Token: SeCreatePagefilePrivilege 4008 control.exe Token: SeSystemtimePrivilege 1920 rundll32.exe Token: SeSystemtimePrivilege 1920 rundll32.exe Token: SeSystemtimePrivilege 1920 rundll32.exe Token: SeSystemtimePrivilege 1920 rundll32.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2824 1048 chrome.exe 77 PID 1048 wrote to memory of 2824 1048 chrome.exe 77 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1504 1048 chrome.exe 80 PID 1048 wrote to memory of 1548 1048 chrome.exe 81 PID 1048 wrote to memory of 1548 1048 chrome.exe 81 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82 PID 1048 wrote to memory of 3832 1048 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://express.adobe.com/page/grPHJpOnWKVve/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa074d4f50,0x7ffa074d4f60,0x7ffa074d4f702⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1680 /prefetch:22⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4336 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4380 /prefetch:82⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3488
-
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.DateAndTime2⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\System32\shell32.dll,Control_RunDLL C:\Windows\System32\timedate.cpl3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=896 /prefetch:12⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14833857963186517788,17767633236514098947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:5048