Analysis
-
max time kernel
291s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 21:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dentonsglobaleur.sharepoint.com/sites/europe-pro.docusignlegalreview
Resource
win10v2004-20230220-en
General
-
Target
https://dentonsglobaleur.sharepoint.com/sites/europe-pro.docusignlegalreview
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246940719758953" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4116 2156 chrome.exe 87 PID 2156 wrote to memory of 4116 2156 chrome.exe 87 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 4352 2156 chrome.exe 88 PID 2156 wrote to memory of 3340 2156 chrome.exe 89 PID 2156 wrote to memory of 3340 2156 chrome.exe 89 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90 PID 2156 wrote to memory of 4540 2156 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://dentonsglobaleur.sharepoint.com/sites/europe-pro.docusignlegalreview1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f08d9758,0x7ff8f08d9768,0x7ff8f08d97782⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:22⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:82⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1804,i,977686832607722898,8015684992865852329,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5f48743c81ce151e5357a8cf2977ba319
SHA12ab7532424ca66966bd7e7904242120dc2ad4794
SHA256e6a94f2254ccb638b07b1466d4f669cae4eb0126887a842b5170e22faee4e0f5
SHA5124fe21465cd2daf054fc65204dec60af902177396c963e35389dd2bd3070ec632afd35e52ff2029b1d4e9b513f5d8891fb819a47e580ffd1e059041259d041ed1
-
Filesize
144B
MD51ffbb781451c19a27fd9995c27163ba3
SHA169660b82ebcd1295e33522e97db2c675cd357918
SHA25600ab3cb1093e540a9275baa0b667fc8dc56fe236b8d3fea19b012609b897b289
SHA51223ff240285ab032d0fb931e28497c59fac5b834b69a58fe74b6934de0404529d1294f55c27e1b20603a06548aa490a089eeef9a68c4fcb73e42d76569ba27f63
-
Filesize
1KB
MD54afa8009d55a7ae846cbf324844ec54c
SHA101f96f47d7d0492422acf10ce5d08f3539b670f4
SHA256fd0097321c0328915f23cb43a650504f5ca2bc18dbd0fa686499c9d3019bbe0a
SHA5126cd82b6c4643ff49779225bf74e765cd969d6a282f00e03202541aa4f750bc5805bf7767c0e6dd275d3f0fdc581ff7c4675b8dbaaa056e596c3fa6053ae34040
-
Filesize
874B
MD5f937e2871f012089c27a20bcb1c55b27
SHA19bdcc3ada75917cdb449da3956822d918a546f49
SHA25692d6c6a896b0644770cf2c7e4635a32960536ffa3c15b17e785f1e237a9be00d
SHA512baab87c585bbef29d996b7c3befc44b96019deaf6f3de5762f4f9de1343e5d1ca62b770340a010863b759f7d8b6e5e1d9805af6bfe67a85471c7c1dc53c02fe1
-
Filesize
874B
MD5e9b51fafd21600b7899d249e20da21c0
SHA1bee69ff18223c1b02a73944efab6e01cccdbd90f
SHA256a74afda319af846d594629f7234e435beed82954e7c8ae555e4c8262a9ee5ee2
SHA5121915dbbb9b1e6c61fea9439dcb3c946c4844eb2ec50cf6557fdf537010d726bccee6d1d2b37e4a342e7b63e4d036054eacbd48d460088fa8f93567a8ef3e7595
-
Filesize
6KB
MD5ad971640cba535b393306387b4b9ffb8
SHA1418475a978ff2466bfb049f77e9d679a01da7805
SHA256a91388b46af0054815af53ed4b429512eb816c3e349035df0b4a98127da1e202
SHA512a4c7370b050ea8bf38ff63682e462585fb9a80b51acf29264979a0393a65960bf9e9a1c708022d836ba7faaf9400ab3fa1638dd7310eaa4c0c21f0f48505e4b5
-
Filesize
6KB
MD5ff4f07b75ee0c1740c72ec2e03cce1bd
SHA13e3aa1cf0747ce7f03786f2d9ded6d3e659bfbc1
SHA2564683348a626759e98ad6d79065d54b962bf21e813a04073f921c4fbca38d801d
SHA512210a88920591d5e8e08a2cd1efdf26278143bdffd86ea6fb5cdf537e6ebce5af550a8cf7d1336e7ec001bc11a180fe76e82067c41ae919c59371862223988a0c
-
Filesize
15KB
MD5cce6ec2fd5dd14481bd8736158153963
SHA1f73b314d335f41d918ea18bf9a21dc18a79bed8e
SHA256d10e91a58172d29f82a0d35a4eb40d0eb084807b3826eef3ad2df27c8f60e504
SHA5125d0ae5a05027087e3f30113cea9dbfd3f4754389a79eee4f41e5aa4842bdaac77b7c47c834f5bdcebff4035def50795b0ab146a1e0ce11ea2fe38c04a30e3970
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
173KB
MD5107b5bc02b21b05ed8b061fa95f7cfce
SHA18838ae2e610daf46eaab4d48bd516fe161d8bea9
SHA256367fac6d5f9042b4c991223bf1fb37527f1787e6656da227ffb9b232093f8bce
SHA512398ce7983769d62f33b2b0a972ba930f0b56dcf91dff98464859b194652cb0bcc7eb071a17127ab7f29a52f46f8b605559bc33e6ccf55670bfbdeb3aa512b5f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd