Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.na1.adobesign.com/track/CBFCIBAA3AAABLblqZhA0Fe0tee2-9ChRNPr0MTb57YKjjgN-52-IGBwFxIURbBzi4OEk91FytIFHwH9rFOE*/blank.gif
Resource
win10v2004-20230220-en
General
-
Target
https://secure.na1.adobesign.com/track/CBFCIBAA3AAABLblqZhA0Fe0tee2-9ChRNPr0MTb57YKjjgN-52-IGBwFxIURbBzi4OEk91FytIFHwH9rFOE*/blank.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133264075860724535" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 1692 chrome.exe 1692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 1396 4764 chrome.exe 82 PID 4764 wrote to memory of 1396 4764 chrome.exe 82 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 4492 4764 chrome.exe 83 PID 4764 wrote to memory of 1668 4764 chrome.exe 84 PID 4764 wrote to memory of 1668 4764 chrome.exe 84 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85 PID 4764 wrote to memory of 1848 4764 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://secure.na1.adobesign.com/track/CBFCIBAA3AAABLblqZhA0Fe0tee2-9ChRNPr0MTb57YKjjgN-52-IGBwFxIURbBzi4OEk91FytIFHwH9rFOE*/blank.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebbbb9758,0x7ffebbbb9768,0x7ffebbbb97782⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 --field-trial-handle=1844,i,7498104769063442771,12268818417084376224,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD531b1ba68ac90fb9107b8fc46c827fe09
SHA1c126a7341a6e5a007dbcea27e30ed0304abb30f1
SHA256f04c326b2d5248ed6dfbdfb95a43d68b1ae917ac81deb624f6729a08dc7fa629
SHA5122b55acccf601a934fc21df4a6b03daf057b63f6e6e6f20d9a3d10c5234ce626622e681c458976b8f6f8a90c483157f81a37914dc55c7b147f33f14aa21bf6162
-
Filesize
537B
MD5fbbf4e331077f14b6c765a8a85991389
SHA122c7e91b4423730e13c4e0515664109712fac83e
SHA256ea6385af64029301850e97a027951e12cca7737f67a30503d3cddecaf2225f85
SHA5124c98a4a8bab1fda344739da967a6dbe26344ae3087e53e20294a4c10ff6f3d297ea3833088c6b629c4f3e6ce6d52794dbd73dcd1bccadff510393e67b8aaa17e
-
Filesize
6KB
MD5e7e64410d180af7bceab0cba99ec96c3
SHA19e7fd6e2b60d45f626b1bfe5428a3e540a6f85a1
SHA256c35497a80924b8d2b0d155d9665eef28f4df46f96273cefa0144a25c2a88a87a
SHA5122d3d45e977f5d4734d8fac0cb4c7010910e339da7e6e0ab7e13c96cd0ad058f1559b3607ea783afae361798ef31a432c9bb73f279a829a5aee12834380f46558
-
Filesize
15KB
MD5a373708399b3f44d9e037815a495d042
SHA1ee4d5361f3cb23e00fbb50f0169cae71c56f50e6
SHA2561280e05aa68fe82779db2b1fc6cd95692dcef2d5db2cf93dd412f748867d9036
SHA5125d79a09ac98bec8213d22efaebc1ff4d651692534fcb9ae4eeec958a3b5a5f2c2e356cf47d1d806b120152e43021f3d1905d247b6af89dfca7e38fe3b1a22832
-
Filesize
200KB
MD533f3a026819ba5211a5798a798aadf52
SHA1e4299c52315defcf1f61fae7e10efc0b64a030df
SHA2560ecf91c25d244973caa7c31a8db6d6b4ceabe95ce9d999f5af3cd884eef712f0
SHA512a2500510ccbf52727000330d40b6b4b7031a7080f71f351e053ffc505e31304bc2d726b56ee21d0f51931ed4bc3c6e95dca74db25e9331216487416cd22e1817
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd