Analysis
-
max time kernel
779s -
max time network
732s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 17:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAA3AAABLblqZhBYlRHrzecMfzS0L350WpXV-OSurOkxseFulRYbRI8QqpzTQyAdXEw6WCADC_HoCUIs5tPBb8lcz_-CBuUBATIG&
Resource
win10v2004-20230220-en
General
-
Target
https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAA3AAABLblqZhBYlRHrzecMfzS0L350WpXV-OSurOkxseFulRYbRI8QqpzTQyAdXEw6WCADC_HoCUIs5tPBb8lcz_-CBuUBATIG&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226868877805082" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 2492 3580 chrome.exe 86 PID 3580 wrote to memory of 2492 3580 chrome.exe 86 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 4692 3580 chrome.exe 87 PID 3580 wrote to memory of 1096 3580 chrome.exe 88 PID 3580 wrote to memory of 1096 3580 chrome.exe 88 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89 PID 3580 wrote to memory of 3328 3580 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAA3AAABLblqZhBYlRHrzecMfzS0L350WpXV-OSurOkxseFulRYbRI8QqpzTQyAdXEw6WCADC_HoCUIs5tPBb8lcz_-CBuUBATIG&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa84be9758,0x7ffa84be9768,0x7ffa84be97782⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:22⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3140 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3812 --field-trial-handle=1876,i,3073218769420807032,8567056504674409404,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD575e779c5ba1fcc2abf1a1736c5c0e233
SHA1483ba21fe0d068a0ac7d88c24c24320457b5e17e
SHA256e657944edd77378a4f3aa8d21b008597639f84bef234d6e613beed111498cef9
SHA512c05a9ae133929d42187f69eaa736e3a4ed4a2ea312da0abb3bd3b3b9674600f29387e00404f6e7bc880224044443caaaf8980f8e410b370a6c4474b0472809ce
-
Filesize
2KB
MD532562970b34de2c659b5943614e0d261
SHA1e0e219a9dc8d2ca89fc751189fb3378044076064
SHA256334a3a99f84866d239aa0ff345a848f2c66ba4b7ef973c073f882d7200128c2d
SHA51225359d435d021ce4d56e36d4f4c15fc0a8af7129ae5df20ba31a14285f98932f4c82bdf99a2084df00d6148d3500bc7c25a37d9d0654af4e2bc0261e1aa110ce
-
Filesize
1KB
MD518a550ddd5f2ea33e8208db80e5880a4
SHA137ed60115111ae5948dd1f3750e1224d0652c17f
SHA25644b7faf86081de0078870ddf6ee0dcca19224c545b9d2691f324779620801dc3
SHA512dd636a7aa5f218eb7158fcfce28be59ffe0a86332d0b02d19dd0af3cc8da18c2366e7edd6a5167988b5727d8ca1de401a14ed19a35f7c5727adb060e4c60a909
-
Filesize
1KB
MD59dacfc046746da4f889b98d9da41ca1b
SHA1ae87f5eb15e15e1324848dc6be420ceb0dbf856a
SHA256a5910e1be62a1048ce6432393726f0c7de4d6871fb5c6f32287e3253339f96d0
SHA512399d13122f08318ad44a2715b1c774a8b60a3001a9c184e25c66d5bf48e82e22bb39e36300fd7ed8089edbfcabc1da4ba57ff0be7ab95bc855922823f110c3ff
-
Filesize
1KB
MD594230094239582e0eda27111571e4073
SHA157a51b16499920036018b35d81086461eeb05bbb
SHA25618a2b697c77692e2f1551da3f260119dcf60522d15845a654c93ed4905c96b2c
SHA5123fad858b3e7418ea82a7dee1fd5cdfd7b6028096a03300e28d624bc51c7c4adf47edbcb7292d77a2b82eaebb845af5a525d7d16e1847545dea1e2bfac981f6a2
-
Filesize
1KB
MD5b6719e40972cf1e0a35c8d3f4c29ad8f
SHA19d30cac1709446d2d1efd7a016f5a25f2d85d2fa
SHA256004d1c7b191224ca3e830929b93297dde13e776bd6f7a49750899fba80131700
SHA51253e2d0e5e36321eb0b94b7610d1b9d1cc017cc4cb41da6c4e45df331108c0eb593838e80b6eb8916a42de9ce45357fade1d274c18100ee80831bdaccacd8348e
-
Filesize
4KB
MD59a28e7e3a896813ca164a12adf89a7a0
SHA140e47bd7cd2d2b2cd4171c60224611d746b6287c
SHA256d9d8c896b6644ecf23a2e7768a94abc82952485f07fa3da8cc64d0d8847d4ee5
SHA512e5f7c965f12a3cfeea47b180e613f18a4965bfb155b82b885838ae6b631fb97d20c9655620aebdcab0444fc0c269697e11e9679488e7f7d04d93b3ebb6ae2375
-
Filesize
4KB
MD5d9110172ba0a1b4d451f787c2ef4a3b8
SHA13d68a45dbe90288da356bc8258c1956c15c2ea44
SHA2568fba0a9dbdbaec2e7afbb5da0162909d84dbe1982062f13f7f2ba98638be1336
SHA512ab180a10600fbc2bf650d12caa932ba735fbff6da4100095a9d4bb56bdbebd76bba6c12fbec775a3b552aebf05231348ead5b11904c7f836a6b2f9f817df1133
-
Filesize
5KB
MD57b24e7e049c48a16b4686b089d663a40
SHA16b75f3de7944e7648e8429144def24fc03466731
SHA25654ce45a7a8f9603ab27e6bd6df2fd5f9f9e37902ee4d2d39c67d3f91b1c8bf0e
SHA51246ef3e3acdebf8037d7cdf03bfb32a24654052240daa1095629ce80cb32bc2c5bdad55602664e8db420a5b4951b0f839009e04469cbc275693cbdca41e1c76fb
-
Filesize
4KB
MD5d30929e749fe2c409b8b0aef9bae0f3f
SHA1484c24b0978b77e9df2ab9766f288c98c88875f2
SHA25622129ebfda0eca285b3f250421e1fe456bf1ee92de06d9fca5b7a9b21e6b3b90
SHA5121c4c7c833c02f3cdd1e74651ae6795d19460a057e5372dac489f9cbfd958a1b003f5061903c0389a26d8a5ab8d3e8818668240603689e8113bda2f7adf7a3972
-
Filesize
143KB
MD50699c2db6f2964955c57b07ea4221c92
SHA13449db89ab644ec7e39ab2d27362a955fcf35147
SHA25642c91e21ec2e0712e1005a99f381149334deb88258b0482e44f59d07522875a3
SHA5120eb678b503fb8008efa1c36d4bc6a2895b6d2220473cdabcf15c05c88d391859bc601acdf908c843150c24a844b9f525544268dd393b9740f7a09609c2840aaf