Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
13-01-2023 12:09
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s1-eu.ariba.com/Sourcing/Main/ad/viewMessage/ariba.sourcing.util.messaging.MessageDirectAction?messageId=B9zaAJ9Bxlre0hB&realm=repsol&awsso_un=SuleymanovRL%40tmk-group.com&passwordadapter=SourcingSupplierUser
Resource
win10-20220901-en
windows10-1703-x64
6 signatures
600 seconds
General
-
Target
https://s1-eu.ariba.com/Sourcing/Main/ad/viewMessage/ariba.sourcing.util.messaging.MessageDirectAction?messageId=B9zaAJ9Bxlre0hB&realm=repsol&awsso_un=SuleymanovRL%40tmk-group.com&passwordadapter=SourcingSupplierUser
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1444 chrome.exe 1444 chrome.exe 1980 chrome.exe 1980 chrome.exe 2200 chrome.exe 2200 chrome.exe 2904 chrome.exe 2904 chrome.exe 4668 chrome.exe 5008 chrome.exe 4668 chrome.exe 5008 chrome.exe 4988 chrome.exe 4988 chrome.exe 3868 chrome.exe 3868 chrome.exe 1980 chrome.exe 1980 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe 1980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 364 1980 chrome.exe 66 PID 1980 wrote to memory of 364 1980 chrome.exe 66 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1212 1980 chrome.exe 68 PID 1980 wrote to memory of 1444 1980 chrome.exe 69 PID 1980 wrote to memory of 1444 1980 chrome.exe 69 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70 PID 1980 wrote to memory of 3476 1980 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://s1-eu.ariba.com/Sourcing/Main/ad/viewMessage/ariba.sourcing.util.messaging.MessageDirectAction?messageId=B9zaAJ9Bxlre0hB&realm=repsol&awsso_un=SuleymanovRL%40tmk-group.com&passwordadapter=SourcingSupplierUser1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff83b44f50,0x7fff83b44f60,0x7fff83b44f702⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1480 /prefetch:22⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4144 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=772 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4236 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1484,11878888691926278654,12183291738007067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:5068
-