Analysis
-
max time kernel
65s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 19:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Submitted URL: http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7...
Resource
win10v2004-20230220-en
General
-
Target
http://Submitted URL: http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7...
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227793875435013" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4640 4628 chrome.exe 88 PID 4628 wrote to memory of 4640 4628 chrome.exe 88 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 4336 4628 chrome.exe 89 PID 4628 wrote to memory of 900 4628 chrome.exe 90 PID 4628 wrote to memory of 900 4628 chrome.exe 90 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91 PID 4628 wrote to memory of 1840 4628 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "http://Submitted URL: http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7..."1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bada9758,0x7ff9bada9768,0x7ff9bada97782⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:22⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4732 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4904 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4728 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4928 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1828,i,13103485506892189188,6576956054809594205,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\b1f1788f-15f6-4dc9-a49e-b54880e417c4.tmp
Filesize371B
MD536d8acfe76d57fbd15747dd074c0b0f0
SHA1e068c9ba3c02088360abb4d781aef08ad363f043
SHA25663efdab692f8f6bb441dcc6bc8cb7561f5b91883e21b83c7f45c2e41bbf10c40
SHA5123ae07ffa642bf0c0687e2b411688327e917cd70b291f7fa5344ad62f0f7e803c5db00df8ce8f64628870c619d5117e31d7571630935f073dc76ab59aacfe1c99
-
Filesize
6KB
MD58c263007e612122732fd24d20fd35208
SHA13954766a53001afbdb167ada993534baa8459923
SHA256fda539983e5cab8058047494454fa253e49abf633739ae4e5fbb571384392ac4
SHA512a19e832c5c1e77b545a56c6c66a66fc8cfc6c3cfbcb683c764c707d779f3ea98484bb88ba51e16d282b3604030841edb3a90227931e3291d61ccf1335a434ba4
-
Filesize
6KB
MD551c3871f0c057c50bc5af4c05c05958d
SHA1cf5d730d2ebf3f0db1838a0df93634f3ad4b6439
SHA256502525af78d46af5808b695aead8d5c74a9bd4170831f6b193562e94fb5e0625
SHA5125d6f5bcae9ce3ff5b4806940202609305a388221c75b2265a907737883a1b5b6e80f438b713c3ab80117d1de4c0849d251d0142edf4b5780aba007054169c1b5
-
Filesize
15KB
MD54d580e0b3aa394a49310f48924bcd5ec
SHA1a77bb15fda54ca34fc5f2876c7cdd16f7f602202
SHA256dbb1b05d8d8dc1f86eb3158356e22ebb5060b037c115cbedf4085316403a1e25
SHA51215c4dd0ec32fb6ac948e5463ebfe109344a69189cf64507366620af0c9e6a2bf481f987ead30aca3617573cbe394d0fdda97edeaafd07bfac570a4b2bf6329b0
-
Filesize
143KB
MD594c41f1d47d9cd21cd0b94b2e41ed748
SHA1f83e0ddc7a3a00942dda9cfca3bf42aee79937e8
SHA2567b4320bebe06965f403dca549e60a84285802973e56d5d12117531b80b752c24
SHA5126d4a9a075b529ac9329b86971e6aff71fe2c4eac292dda9c1d005b5e6c491110e2ab8940ee6eab22c1ea766b42f7d59f8eb1f744981066c5bef5d55768aa217e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd