Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 08:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://login.bizzabo.com/partners/signup?inviteToken=d4b043aa-c2ab-4db2-a530-3215cc0d9026
Resource
win10v2004-20230220-en
General
-
Target
https://login.bizzabo.com/partners/signup?inviteToken=d4b043aa-c2ab-4db2-a530-3215cc0d9026
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239503938367844" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3332 chrome.exe 3332 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe Token: SeShutdownPrivilege 3332 chrome.exe Token: SeCreatePagefilePrivilege 3332 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe 3332 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 1728 3332 chrome.exe 86 PID 3332 wrote to memory of 1728 3332 chrome.exe 86 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 4020 3332 chrome.exe 87 PID 3332 wrote to memory of 976 3332 chrome.exe 88 PID 3332 wrote to memory of 976 3332 chrome.exe 88 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89 PID 3332 wrote to memory of 4552 3332 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://login.bizzabo.com/partners/signup?inviteToken=d4b043aa-c2ab-4db2-a530-3215cc0d90261⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91429758,0x7ffb91429768,0x7ffb914297782⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:22⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4972 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5656 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3668 --field-trial-handle=1812,i,4592918389956951565,1828288341941211788,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f22f07ee02fbeed3958345c90b52b818
SHA12aa44ea19d580589c06c2170103b4d0505e18cdb
SHA256dc1eadf37f70bef92766d0c316d1da7af283b84e5c309a4732d8ed35d7bbfb84
SHA5128473f7cef3e9289f355047689f5a2b82aafc49501c65f118e5b0632a6a690e542eeae45644e77fa5b869df17b05ed138b4183cc93364935b1fa7d89e32fe5d5d
-
Filesize
672B
MD5654f94a5b0d6f164ebb2abeb29a8968d
SHA108c29ec882fe092dff0e71b8d9cdca8ee0b63243
SHA25629263e2f538a4d644bb110a7052b280f453acc5d906141ed220af03940bbeec8
SHA51258d2df3b47eceeda9b188d121edf33808b79804d9c242c9eb2de881bedeebe4f50402e6315c30c436d87c6d85b5ebbf77b0b6c746ef5b87df80f056e15f34401
-
Filesize
3KB
MD5420b36fbe888422cc8fec7a612266bd3
SHA1e31428ce26ce43c1ea6283010aa047a8e3ae7561
SHA256e31e61dd9a9b1f63a63a49effbf78973f02df2445401286541f57c66d2f35e86
SHA512f686ec5800419bffa4ec62ff8de42ddfe19ea9950924e2c5dffa8fc6fd5b4dcb779869db89be1b279a4e6932efc3eefe36eff7b6949a62adb03cd772f4f3cc3d
-
Filesize
874B
MD5394d7b5311379f9fbeb6962d45b90f7e
SHA10b71d8dd96d61a652bbde375d61f7ee47a2ad712
SHA256cfbb589d49701b8e274484ad54f919f8c3a74b6297458341b8e916127a3b3217
SHA51256d815b4deeb419664451161c6f26fe23832cc7f2ba29cc4a9eb2c84efb1c9f085c8e4be10706857b8dda5b61e2e9a806248efa1de567e562ca8c064a4485c17
-
Filesize
1KB
MD575f807b4c35867d878fe813bf9d7039a
SHA1f7283bff5f99fa534114744b37c68e3d1af6d90b
SHA256276fedc77b15c882b24194918644d69da408f8a799f12b34af531b7101a63f7c
SHA512a76b89e498d8b6cd6faae20c1fa03284643bed5c012917c2662284c77e0207467cd2664b19837148dbcb682ae16c7c7f75021659c47129794d018deb1a27afc8
-
Filesize
6KB
MD5f03e3bd3996f77b451b1a09b30e07052
SHA1e77b3d3c9259a1788032d828921b072e49c0f628
SHA256d50e8a75404d98d8d283eb28012b313eb2c1d14772821bdcb64713ab6fd37662
SHA512d3eb8620cd0e177bc6baf6e598ee7d3a41bd0e7ec85641c9f09c2294a99367dc60d81717f137a950adc5ff88955ab936ed3b03688010cf35e73d942c526f3e0a
-
Filesize
6KB
MD52c0edf67529b5fed42886337322b0405
SHA17e673f3d3ba47a189bea62f36ed7eb3ab154d14e
SHA256c5039a0e1b7145b10b63291cbf0148d49a360814ae4ec7f21c62c1ff319cc75f
SHA512544da306f30dd416a156c10bab67e68bb908259e2b6af163f31277ca11aff7221d2237fe190625304dc15f7068257317a4c163c0669ab72f73abfbb4f3bcc9c8
-
Filesize
6KB
MD5f5754a6eb710e01a3d3a189cc2cb905e
SHA1e4eeb19cbc232913a45762a15126f9906cb9d7fd
SHA25636674989d0591660533bee8e9ab315d383c5e6feb28f30c4f24d297925b208a1
SHA512f8f167d5b26492b62b31be514d8c24745f9ef58d49b4393bb1f25f240682b5860031055a19cba7b3df244073e0e9ad0a362b5d6b83d10bdff378377c22d4739c
-
Filesize
15KB
MD5f388a7de4ed24e89403a3c326494f054
SHA1bb855ccec61c1ac03f446808e8075f12c933f09e
SHA256e1c7afefedb4b6d28272546887b3b2582e8ced6c2df0754098a33109154a7987
SHA5127c739d14004d52ccfb6b4b5e57b90455668aad4002d594b5a5fa1d543db1652adf3b737bd527db74a5f664595f24b71450ca60eec8b9864f446bb341b66ebe01
-
Filesize
144KB
MD587beb1ea635a1a43831e2128272921aa
SHA1fb7ef2c749e1d26b3d7e7ff5a293a67350b30198
SHA256e01513b9561b1ab1dc5025ec9e50fd621379fd12d7010f0be122e2d4e1ddf7de
SHA512d70bc806eef23c4a37f27924dc24f6530f37497372165b7cf256d5152f1aa38fdfd5d31bdd80ea0a839b220638df906a3684e8027a6261ee0b4711f1bf46e379
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd