Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 16:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://texas-tfc.litmos.com/
Resource
win10v2004-20230220-en
General
-
Target
https://texas-tfc.litmos.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133223397196430947" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 392 1352 chrome.exe 86 PID 1352 wrote to memory of 392 1352 chrome.exe 86 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 4328 1352 chrome.exe 87 PID 1352 wrote to memory of 368 1352 chrome.exe 88 PID 1352 wrote to memory of 368 1352 chrome.exe 88 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89 PID 1352 wrote to memory of 1840 1352 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://texas-tfc.litmos.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac1d9758,0x7ffdac1d9768,0x7ffdac1d97782⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:22⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4984 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 --field-trial-handle=1832,i,17179931741524336273,16656690537614831163,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5660e6c3d540b33d7375950133e665166
SHA1197be3a049c99373fd4e2f36b35a3d94c0c34014
SHA25642dadcdfabe156129e333f81a77a3403cc5aab8800f5a010cb1f5348eb383fba
SHA5129ff8e9a4bd47f49def0f3cf8371116d1a45d62b26fd2e9e7c75f5c891841ff6fbd4008124ce3914569c765dce679077622c7719422e2d53df6fde04e83652d72
-
Filesize
2KB
MD5e6533a19bc675ec8c8f5b36e4f981b67
SHA1312a0c2bba9579bc40dcec363e0782832836e03e
SHA256693680ec3592c01cad72a65f67f0e0a8b2a1e35b55c48a98333c986ec6332df9
SHA512d5bb503078f06c6f6c43f9d1c077ca428c03dfa8cbd6f89241d5fb290ba7d0c3f67eda5645749c8764253a6580483defa054490283c55cabdd7dd7c869535aea
-
Filesize
539B
MD547d1045985a3882acf0fe2f4b2912107
SHA1bb1b8384d35f0aa64f5e4eb13cdd4ab1048bbd31
SHA256dcd9189abda7420984fbe69c9cef9aa3e8061644e8050c8364bac6c965b4fbe7
SHA512eac2a0911d9e1e89101eace6e8df95215c5b4eef7fc737f8fe57afcdd61ff3ab754523603ce99e86c2ae80776128a952c30ccc7846298143c8a7c331d4a76c9c
-
Filesize
6KB
MD50d6ae5fb6a15dd9083f0c6332ee14891
SHA1756c65c4b816e6be16f1ab0fc5b1993d06a7901a
SHA2561ffd28f5ddb8135030d44aec203c07d4c87d1ea3aea42f00405d37acb38b3634
SHA5129070fe6d8f914e72f410a894b803ace2f302aa090698a1597b7d48d83381759e35fc072065067b45808755e1075a781e660a34ba29c3610e079ce721ab7ae4b1
-
Filesize
15KB
MD5f0d67aa7e8b6fa1dfeaf4b2a197fb06f
SHA1335557d2abe2c45af9665f576869258ab5bde0f8
SHA2567cbf040a58efd976963fa57cb45c7f2cba2b5f5f0ae0c482dcdef7bbb7ef682f
SHA512c64b3194754491960bc943cf6121d10e789023403ecee1055b12eec6381f7a55089ae7fd86024843ce2125ac2b91afc1e430c9bc590bd3b1d0ae2cf583139a1e
-
Filesize
142KB
MD59cfd45adbf9cfa8c095bfa686ef7d18e
SHA16c3ed1eee1258ee236535e60c674a659019fa58b
SHA2568f7873e1efb0451b4e2c32e90a0ccb0cdf1dfa2f00b6ff570772f5f9555012b7
SHA512b8f1a50d21646790aec4be916f92a9ebd38dcaab4815f624825e955fa7c22d7877d5f804824d883c08a239b4988af088f7efa84d8ca5ee8ddfd7e94f0046bbbe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd