Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 23:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sso.dayforcehcm.com/cbb
Resource
win10v2004-20230220-en
General
-
Target
https://sso.dayforcehcm.com/cbb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240928982815611" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1864 1312 chrome.exe 80 PID 1312 wrote to memory of 1864 1312 chrome.exe 80 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 3868 1312 chrome.exe 84 PID 1312 wrote to memory of 1972 1312 chrome.exe 85 PID 1312 wrote to memory of 1972 1312 chrome.exe 85 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86 PID 1312 wrote to memory of 3660 1312 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://sso.dayforcehcm.com/cbb1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffded819758,0x7ffded819768,0x7ffded8197782⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:22⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 --field-trial-handle=1772,i,2437430948165661898,10487408356195604585,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD586e91b84a1f185d28d29dfef89751011
SHA119936c9c167f4a22e614c263b6c971753ae00d38
SHA256821281920930896d7f562ef18f10114bf20f02b6ceea402339ae2f5903f32140
SHA512be80fd0aab11f03fe37203edc2349d623ef9be683cbd21b362ef23dd085c8e47eb88c1b3cf3c432d8fe7917c4f5d58dacbc34a33d44779b3fbbb8285261e6d8d
-
Filesize
1KB
MD55cbb5168b800487a000b07d09cddfdf6
SHA1afa07601e2d5b8030e77b92214a0eee438bcd4e6
SHA256b339281d56dcd968e92e3fac8dd627e848169976407e5290d42ceb5d74545908
SHA512442ada7915a5984d63c3f91ee0ff622d55ab7287be040d5189ea4b556f2281a4a6a89b33e2cf397283abec28a3a3d3a29d677b3fdec96dc730f586f1102465e0
-
Filesize
1KB
MD53e3e1be2aa247f7b53e3fcfd18f1ad84
SHA191a49213ddb97d2581e882827ba468224c9ee5a3
SHA2566897e7237423a8f3299317393853a0ae1f31307f7836dcf80e9e8d62a5bc7fcc
SHA512c6757c2df33c01c792600627da4b8bc63c8d21d0675df02be0d7e574bf319c9523597b4f26d665979abda82cbbe8d646d580858f488dedcb97d11a8aa38ecb8d
-
Filesize
6KB
MD5bf6dcb00b62927e682e38d329f07dc77
SHA10c8d1ec7c07da44123b97f12cd31183a22a86f46
SHA256411b1c0590f9c720641447a4dee0c3a631f582da680d978757f24f26797da557
SHA512f820e5bcfef601e857b558b13d7813db55c151b08147479b3dc52ea581149b95ac8908f9cdc40d3607bb37f59e831ad7f6ce2d5d676a96151b16e508d1cfbe75
-
Filesize
15KB
MD5e6236ba86c7c7ac088397d1290883d30
SHA1f632d7fdbcf1d4ecd2ff1910d532272cadab736d
SHA2560851f3c2c4604f1e91e134604ebde6985054ffe5a68007565a586e6a95269998
SHA5128bf380251b4e7fe7f8f02ad4ec31a469d80178ffae90110e41805e85fcb4674f33477c635f4de7ec7de72ab2572e05a0d911375ffdd1052d0c8587efd6aa7cd2
-
Filesize
145KB
MD5373530402af11349620a8d3a59ff69d5
SHA17680273cfa2794709b79ea72e9663496c93d1876
SHA256e40e34fffdaab667866eb70eb23742946173bb72083d4b5bbee4a6a0076f2913
SHA5121aae2abbece5701996b61405cba92dfccca90eca8c936d566c7e479a9ee80a931dd4bb5cec55c0048d42472e19bb662c1a132e83ea182ae2a39ab1a3010a31cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd