Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 22:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:bad21a44-e599-337f-bcdb-cfeed756c34b
Resource
win10v2004-20230220-en
General
-
Target
https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:bad21a44-e599-337f-bcdb-cfeed756c34b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 632 chrome.exe 632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1836 632 chrome.exe 85 PID 632 wrote to memory of 1836 632 chrome.exe 85 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2128 632 chrome.exe 86 PID 632 wrote to memory of 2368 632 chrome.exe 87 PID 632 wrote to memory of 2368 632 chrome.exe 87 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88 PID 632 wrote to memory of 1092 632 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:bad21a44-e599-337f-bcdb-cfeed756c34b1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0x88,0x10c,0x7ffb93139758,0x7ffb93139768,0x7ffb931397782⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:22⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1256 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1824,i,11129319736949542903,2174922260478174927,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize96B
MD59e8869a2110e44dd665a6f73f6258438
SHA11d1d342c74e62363c305b1feced84ccaaf14d961
SHA2561b56cecb36fac74074ba266dfa2878c08113ce3782115355f556768ed7828b12
SHA51284a0a8e32ee5e2e4f2d1cade572c277394033e27bc18597991e5f3584d7b48189d461fab0f5fd92ee0ce5411ffd2fffce2ea6bee0c88a8a6c98500c4c23f15cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_acrobat.adobe.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD56c971eadefc9160a5289ffba77f696df
SHA133cb38ef4d59b1e2f83bc1710cc7602e2ffb8d67
SHA256f59c58c9652eb2c58599e1b8c4a12af2815febdeeb6e26a02d5bd8e6a124c903
SHA5128a2d4737569dfc6d2c1a0e3fe00a6c16217496576aa30f3d231e7c1dfea6ef847f5097fffb58a70459b7104188bce96241b8e998def1a5218ba775633714495f
-
Filesize
3KB
MD515bf0340f8b741aae5e9cb76db523ffe
SHA19a35bfc76c0e4aafba9bcfce223dee52a0843635
SHA2564fc9fbe87744362c8cb844d68f9778b6dc50c34cc99e2672f44e90ea3e5bb7a7
SHA512ec6507503861c2f8551c3faf5bdc44a47016cfaaf9a7a8b744f1cc4604ba0312382f92a99d54fdfa9142a485cab4cc560ba7a749c2d7767e7ea59b79ad5c254f
-
Filesize
3KB
MD54a4c664d44dd6681619e901183bad3bb
SHA16f43c5d68e8765657c7c5b89e2eec6f4411f4302
SHA256697fb432e4b5adf193b363cb86380e7383c6a024026af886df5f63a37ebc4195
SHA512cbb297627afb81d4048b9938a2b3c490d0cebafeba42319560f9811875b65d7446f9085270dd9875f1b95a884be8e6e8faea05c7d16b9606272eb36f428f3ad1
-
Filesize
4KB
MD5b7a77926f2f014a71b6318e986a998e5
SHA12da373cb6919e24dbea6cd8ebc0124fa5738e489
SHA2560ed2b9fbad1477b21c6972efd80ceecbd36ef83e907b26fb96b7f4dde68675f6
SHA512368381ef861d781d609d3e331a75c469d26e6bdd98ebeb482db1477a405c75db85dbcbccfc550512c4ea92126252063bc88b02a80527450f1335cd6f673f3e40
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\07b63a63-d0d9-43db-8a0d-2bf27ad67c16\index-dir\the-real-index
Filesize72B
MD550c7b23d1e87fdb152a3f64c42beed37
SHA150aadca9f16720c3397160c32bb4b77cb692e831
SHA2569f490d8962f93c179227b73c017e12c176e78eec595338488b65449ac1f574a9
SHA5120124229cd5b3b624c67de795e7714d8731f47e58553b284f766c90db08768f7248a469e2513d02356bafeadbd5433effb68bb7aebd6ac197e31a7adfffa8fe18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\07b63a63-d0d9-43db-8a0d-2bf27ad67c16\index-dir\the-real-index~RFe575fc3.TMP
Filesize48B
MD5085504e1ab0d1183a677fbe93af3e1e0
SHA14922292dfcbc1fd168b95a6f82c2384e60afff12
SHA25661461512c9646758b703684513c6041feeb0a0772cafff2a9f71fa9ee2459dab
SHA51255af596f1832d829d2595fa48fafa18ac672213a9104d54c1515de5cb90e5aa9ba0e0492df3a34e9cc8e9ee7927be02bcf764b87a615a05da7fe5c37e4663c39
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\index.txt
Filesize155B
MD5e27a2223fd9e4c2e1be24a5e88e45adb
SHA1f24915894575eb0075d229425964a15aa49238b0
SHA256214911c7c0ae5e7a26616ddc71142c31561784d356aaeb9db64c92ab6dd26359
SHA51219a933fc9a3ef8d103fd353821a02d6337c7b78dd4b107f9cf82237a375b24e8fb27c7b6fa61d960d4049e4366ea8a49e79205a7be2bc5ea725f68a7a5a6eff1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\index.txt~RFe576012.TMP
Filesize161B
MD5d6e6cb9e3a280f115ec0a9d69be8150f
SHA15c64538ec444941abd036eaf0bcb73ffbedba53a
SHA256281df59b9c0c97ebc8f4501e8980acba3483f3a5c02a3a18f9ef59a3c1286647
SHA512065469fe8c7b415d8996b088ac24f5ed3716f5302cdb923c8d1a4f2058d7f0a5e4e6b9bccd15637e043d1bdea4486ad7153bc70b8ecbea088b04f906a9ababae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5478743e4d23535116b360969e6110673
SHA1adf63c67ba6f65a6f79938dd5878c30600d9bfe1
SHA256f935410524b1cc8ed38afc0616f774d244d981aed5d1dadead7e28c16dad6ced
SHA5126d25a60b4e79046942de5fbd429def9fb04bd9d2f8f2d16336a1d6c52dc43441096cc35e1ab287babddb4e343bcf0d676d44e0fbfbea003b2d295005eab087d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe575f75.TMP
Filesize48B
MD5b86ede177bface20df6eb7cf1e9c0a8b
SHA18f266d44c4f308df1ec06c0b5dcf261599e89f48
SHA256c9f2195eff2c06f26e1b6270b71c70a73013f499168b804007bc1196ef0318dd
SHA512de20c1c24651cf236bfd8c2ea0679bdea8584c833ec091536eb0a4fa48471035986352a0061ded48a33816758157c60304cc16f12f11eadc746e59b0330763a8
-
Filesize
142KB
MD5a189f2e7dc273791f2fa382bc89b63c2
SHA1b8e9623d2a849fb63b1f70c9f11cc74b36d7c49f
SHA25634e49fdf4ffa8404d23c31e342b7a853883032faa6c3891a34ac0a1ff015d101
SHA5123a8d577981b6f0f743cf5dc391eb2c4c2b55b723ab53a56d0c02544a274861428dfe8d8a267cf33794a75551a5257278948a914c4a1b84a4b357d0358b58b330