Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 05:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://static-us.mimecast.com/mimecast/resources/images/notifications/powered-mimecast-logo-278x28.png
Resource
win10v2004-20230220-en
General
-
Target
https://static-us.mimecast.com/mimecast/resources/images/notifications/powered-mimecast-logo-278x28.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221214274268761" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4876 2784 chrome.exe 86 PID 2784 wrote to memory of 4876 2784 chrome.exe 86 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 4216 2784 chrome.exe 87 PID 2784 wrote to memory of 1264 2784 chrome.exe 88 PID 2784 wrote to memory of 1264 2784 chrome.exe 88 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89 PID 2784 wrote to memory of 976 2784 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://static-us.mimecast.com/mimecast/resources/images/notifications/powered-mimecast-logo-278x28.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbf2f89758,0x7ffbf2f89768,0x7ffbf2f897782⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:12⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 --field-trial-handle=1812,i,12697017927934239710,9702084180096772528,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD556a50a76136f0c34d26afa1405c0aa31
SHA1be3b05586d6449f9dd9f51f00c687b8ecff7799b
SHA25664b597e98b5d5c07b342a8c86d852a114c05e3829fcdeae34a9748056758ba37
SHA5125ff602e3249df911b878e455997c8dc3bd0477c4030a150bc9b3d8878d8487e1c37f14c7478666ae32f7686f7b27fbba4438095180ed9332ab149e56e8d4de38
-
Filesize
5KB
MD5356e519ae056d9db9dd69078fc9601ee
SHA1cb46d6088debcf9a97d16b18fb22b04a365ffb8a
SHA256a455a582cbfafd4f7856ab4fed19d3cc80d88de0c21754e92be193396c7b24d2
SHA512cc7a61d354f4d520deed65aa9a2ae6ed36f264408f3fcdb5e318fb9c780d88bfe64aa6573af950e6f072a5e7225c3d4b20ee7a7f9b476741d028e03077c93da6
-
Filesize
5KB
MD5f112bb9a480bbcef865e4b0dd986144f
SHA1472841f08698ae53ec9cf17562f7c262cbd51496
SHA256ef80c509de76ad21d82663af12c71c599b8a1a35ff28c166f645e4bae8a8bb3c
SHA51219c286e3be3792595ddc5e5195c32681c9e989508dfedcbd562df1c65a1f8f7a4f21babc433c9dece3e7dfbbf01f1017348d72308c2706666957d3691dc5d053
-
Filesize
5KB
MD5a6ba531ddca7dcc7b9d199e605e9799a
SHA14b6a85afc122768f14b51b6c1399c8674403aab8
SHA256eb960b608e74c58b55b53b286431cccb895a2ac7395ec23247a51e1097b3c10b
SHA5129a10002b24862154ff257d2340d8caf1937bc994b5d81d649d6a22b7f6a52c0cd6f098e81c6892eb52752d9090d747771769aefcc8660038cd68f9930411002c
-
Filesize
141KB
MD513697d95de84bf502d2cb7acb27e5dc5
SHA1c1b270a88616d0f82065103ad5a0117ab6d289d6
SHA2566b58243f554c5d4e9f6234526a420c5b4d14a8d45b5bffb2e1cefbe83a8b33b8
SHA5122a7384fddce4d6de4112c299ca45d21a1ca40e909e8e16ffde560e015105d600021f4d361995c0e7d78873864368f66d67121da5a3d0b412a36a48fc293dd571
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd