Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-03-2023 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://form.123formbuilder.com/6376078/my-form
Resource
win10-20230220-en
General
-
Target
https://form.123formbuilder.com/6376078/my-form
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239844596077300" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1432 chrome.exe 1432 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1432 chrome.exe 1432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe Token: SeShutdownPrivilege 1432 chrome.exe Token: SeCreatePagefilePrivilege 1432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe 1432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1432 wrote to memory of 2616 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 2616 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4776 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 3084 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 3084 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe PID 1432 wrote to memory of 4872 1432 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://form.123formbuilder.com/6376078/my-form1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff1fcc9758,0x7fff1fcc9768,0x7fff1fcc97782⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:22⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1984 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3600 --field-trial-handle=1652,i,18004209687930483587,4671914371023994644,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5deec86d16f217cefae8afc46e2b2e325
SHA11327e4080ce6d085efcd4da39bd4130763f4b26b
SHA25685c7e068fa2f9417e31b0e5d8b1e340c9d6dc7e0cce9941948029b87f7b0167f
SHA5128470625df2eaae1a1c3218a11750d823b5d3ac5e3462fb1fb56f86bd4c6fb67377794dbb5a2f1d3240542a8eb15fe88a2d7438e385861cb1e30ec66b3a0eba0b
-
Filesize
1KB
MD5df6c6bce2d7cea156032a8ef785f9757
SHA1672bc806484f794cd7ae4175e71ce41442027fbc
SHA2569e4d07b2fc73dd03b427eceec51895cae63587189fff2decdb0105bec81c3ab7
SHA5128d1f5afe3f7dcc5a3316d3b31b45239be00e63d4f95cf6a11743629163f05bfa6e5f0ad343ffd251f8dab3ff3379c7d927b663b1d8f0e45718976a75bde34874
-
Filesize
539B
MD59c534903e469c2b231f0626b4116fc3b
SHA19719f0d1ef2e868e0f9a2fea921cf42dc6965537
SHA2561b08684cb62b785ded9a83c76d78d06fb275f23147ec35a2a83136bf1b9a6c4f
SHA512ce77606db2f4e682f98810538324d40b40f0ce1c99a2b8696e64d3338bf6cc37884773f53370bb073902e9f00de794bc99099ab08b90992593ef99eb4a899873
-
Filesize
5KB
MD527d86a197a3ed416c3bb372f4b0d4bd4
SHA1da7e46d4be7fe7a79599f2ea0f2029016f16a88a
SHA256e16440166c4fb0922bfa76f83c76301aefa1e50eed4286be12d136cbb95d9c57
SHA512be6273ffed61b228c8bb0d0a0c6fc815937ab2b4a07dfd929cb0f932bc6acf96971c4959c3967c2f4f9816754ba0c694b0c54a403058ba764cda2a71f16a964a
-
Filesize
5KB
MD5f2409121692fca2b7d988de2e37e81b7
SHA1c5382f21082d30090d9849ba96a38e594a50a5e3
SHA256081d3dbe1e6b59e04e8b077e20e6a7094ce859ace855b5d2b6093769385c45e2
SHA512dcd700126144cdb0f3eb3464929c55f6d80e0fe357189181c4e9404858fd14190b2c9caa5ca23ee0540dfe74d41c173ccf522ce4f9a19409c56d697d41a6e542
-
Filesize
5KB
MD5cfba4f423d1fcd0d299fd81096e23960
SHA1a2a0f9805815a7c3423bd727b1f3e6c372315c38
SHA2566adefa443631ad40c1c99eb0285655ba18ed73b862102e63435065662e1ca4d2
SHA512f89c0a4cfebfd201ec96838fbde65a69aa9e7c601d6dadb2b2dd72dd88bd4ddbfa2bd98544c3079fb7b5b75bdffe7ddaa55ebbd6bd3c9ac9fb82665c31dd7149
-
Filesize
144KB
MD566b4afd97c6f2ee41f9845224dab01a2
SHA1f6e5960122d7f86633a404a9b1fba24f17baa42a
SHA256901ce7dd437a20e18355fa08f808a709b64b6d1c0ba33821d448c8c56c9d2a53
SHA512c955f7a6ce1d95d24bac1d8dd1d66b8f5987e0f32f326b5025ef9ffd2ca004f1a5e3f5a1a70aabeed5811c20fb054904607d230e968e4ee62e28cbd84b575d84
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e