Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 14:46
Static task
static1
URLScan task
urlscan1
General
-
Target
http://[email protected]
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133276851862349576" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 2468 chrome.exe 2468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1280 1384 chrome.exe 84 PID 1384 wrote to memory of 1280 1384 chrome.exe 84 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 1056 1384 chrome.exe 85 PID 1384 wrote to memory of 3084 1384 chrome.exe 86 PID 1384 wrote to memory of 3084 1384 chrome.exe 86 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87 PID 1384 wrote to memory of 112 1384 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b16a9758,0x7ff8b16a9768,0x7ff8b16a97782⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:22⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:82⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4768 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4756 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 --field-trial-handle=1820,i,136034267970714119,15882958616924105838,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5a6010eec21790103e2b34696c1fc4be8
SHA1fcb3e81676efeca4ea2fa4dec7164e581835de25
SHA2569b189e05a81e922fdd417848289f3d948c5aeebb5faba5b028f090ee60561e0b
SHA512c80c2aa3f243655e898d2ace3b0c46f84c9938d1e991648578bb34944c543dab3087986bcdbce79b6ac66290d774cb4fd14baf4b9bc3a74a9916357b182e8945
-
Filesize
1KB
MD5a4962e01a0e328135b4f0e137416a2fc
SHA14d8f0b227dbe01e40049a12766334842315662b9
SHA2567be7f42f7d9a6376392667adf39344bd38fbc0c6ffca70f796702bf24e855831
SHA512abbb36248f50a72430e266b81be4b209aa00f0325583259e871da0ef69c9e3b55c94c869a9864454b6277aa373840daece4f28faadee3d99f1552da3c2afd607
-
Filesize
1KB
MD59894c17a2aa1a13063f10705155547f2
SHA19ce8cb118afdac4865a6855a36e101b744fb87ab
SHA256f0bd1ebed1c85f48f9cb1aff047e8489a864955b5f1a789d59431c469913339e
SHA51245ffc6bcc27b840eb68db1777cc6d8fc1c9224ae5e66a134ed5c4c919ab425645222863c5f292c56ad06a19633263d49be7d4bd299c2f3b765f02ed624bcaac7
-
Filesize
6KB
MD5911222dc634703647e8223cb1b1326b0
SHA14680cefcf39585fcf9543c919a1a3477d3e80c88
SHA256bb7b53a8ba236aa9fe6eb28a845bfa8bd58e15a0868598ce01dc679a1bf5e823
SHA51232e6473b3fc6cb2f7f09aab1014d0f66f976bcdc04a66bac60ebb7b5eb3e4f6968adb6aa97e76300c122d2d862bc40aa366b8a573d87833cf0e545ecc62b6f2a
-
Filesize
148KB
MD5ef36f93e1c9604dfeba6d6fd6f39dee4
SHA159591e0f565f0406d33dd982e8fb979db0171a0f
SHA256e4312289b2046ca96a725f9d4b99b76e91fbe9e792ff27adf9fff45b2b7c2d0d
SHA512ecf2112d3c3263b605cf083077e20e9752832d12fad9d35b6f8ac8aafc35d017e150444c45198907fd4a1e3d0dbe71d564fa85f830a86a8b7a9af07ce35e61e7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd