Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 17:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://indd.adobe.com/view/182c3cf0-9a7e-4a07-8396-1d654ccf971e
Resource
win10v2004-20230220-en
General
-
Target
https://indd.adobe.com/view/182c3cf0-9a7e-4a07-8396-1d654ccf971e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133281274845662007" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 3756 chrome.exe 3756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2280 1964 chrome.exe 83 PID 1964 wrote to memory of 2280 1964 chrome.exe 83 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 1832 1964 chrome.exe 84 PID 1964 wrote to memory of 2856 1964 chrome.exe 85 PID 1964 wrote to memory of 2856 1964 chrome.exe 85 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86 PID 1964 wrote to memory of 220 1964 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://indd.adobe.com/view/182c3cf0-9a7e-4a07-8396-1d654ccf971e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b16a9758,0x7ff8b16a9768,0x7ff8b16a97782⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:22⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5128 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2452 --field-trial-handle=1808,i,14040099610288374125,9149011013318030392,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD555c498697c0cd87e3b4461d843e103ac
SHA1db060a0a23b53e3036a4273cb104ca6de2ee6d06
SHA25620f3da8fcbeb346acc4d4511927e1ea4b30cbbac2247095509652e430eb415b0
SHA512e133d68978b1ead8fe4d2c386a133f440409766ed45ee09cc82236cbbeed7a10c7c41c0c9fac6818ee92386a04a7c53fe3c66430a1f3c0a3036a73e39b3fe226
-
Filesize
360B
MD5f12c6d13833deb243a3ede93eb989636
SHA1956096bfb213f22959665fc016769fe7dc7a169b
SHA25650ce38320849dc1ae984c03e576abb15f498adbf1b4c998a1c1d64504e3303a6
SHA5122110f4435e5b5bf23254c4712d1245d44b8e6dba6ecdfcbc7b4e3c2ea7304f6e11290fc64ad733f7c380c1e1082181b34ee7f55356638801e724acf55541272f
-
Filesize
2KB
MD5630eb595461b1a0298b4c23aec59f2a4
SHA167e97a4cac94755fc0a30640203bc588b99fa933
SHA256648059b52064b7612d004c63703ac8ab2041916ed25b4ae0bd56db07c73eb11e
SHA512ce6a6707f25ea7c5213c2893d8825b3dd8b2c4fd8f7bde57bc486b44c816e6572db06b10388e536249d51cf17607261a876e6e0cbfc4f1aac526fccb0f6b9e05
-
Filesize
1KB
MD535e8b98cef591f78495c21c4adbc9417
SHA1ae98231d55d53a49f564f45cb26ef811c0d6706a
SHA2565d3102e8ef8e6c57380c0f656ab2345dccfdcc6f2dbac123507f1631d6114cfc
SHA512080016353891bd0c61665962357596f94447c8a3887eebb25b4ae8e2fcc298f2f3a65fcfb17db31e1957e889d048cd367d67e12151c9b3e1a5ede531e4989c51
-
Filesize
1KB
MD57a6a7b2693326bb9cae123af6114022c
SHA1dbd7ae67709224d5a03d0e73a1fc8730391da107
SHA25653c4c1923322f0e280788b754be266e3868a4bd2dc24bffcc73fca32672cfef9
SHA5120623e58903cb15216d0ad45102540839165fefeed735993536ba579cd0970043985029025045f8bbe9d945af44f5ab47481b2bb3636e3a4a0ac8fda6d015ade7
-
Filesize
5KB
MD582ce85532d8d233b8ae01e704f48c9cc
SHA1c4ae621d7a5401a2739ad982debe8892e42c385f
SHA256e3398d6f57240b0184b420c8fa581211efe0eff6b2c5ee42810d31eca172c260
SHA5121d8588d21e06c2ed0e6aabbb08d5b2541cf40c55f7ffc4dba93283e41cb2c06a9ba4f730dc92559bd47a6fdda7f07b875cbc0363d0cf47f4b645b0da0c8999be
-
Filesize
5KB
MD569aa1124214c657b73730dee9070a97f
SHA1470b192b3af816a199e5624522d8a9236d9a7e8e
SHA2564c578724d113d0f4125b8d5c8fd17f841a8add685826893f59d443823fed75e6
SHA5127310cea9935f47b8cc909b7d5f4947b10b4970e6c2aff01440adc17489dad33400b2b4b93b1a4384c1a5110c51d6eb3e9cad66ecc4381627244af7a4023ada55
-
Filesize
6KB
MD51f4fc832c2908b254df1c09d11ce2d35
SHA1f0c9c0ce7c3c403675ce073a967f15f12dff419c
SHA256ac298ad2d5f5f39b24a30cbdc1647e1cd0a278ebc383b32ab5c1af2fdb9a05a4
SHA5127f8ac76acc6873dd62390e12f6f76e0387c8c51b7a2dd9dd5411f7a261e9c65f63b0c4d3d776a9120e7d797a7e11eeb459eaf59bb5db8525093dead6977fcd94
-
Filesize
149KB
MD5565c1a8b6f532ec8555bbf416f2637ad
SHA1dd58d872b1d14244a940fdfd0e1a0356a44c495d
SHA256c78ac0417ebc81d664c9fe6af5a1d4c34bf6b087afbaaed7edf889a9438be97f
SHA51242f9f5fbdf1057318246f2a797821b20c2f4acfbe38e03532b291ff3452345f75d1cba383000e72f10c034dd145cb7977da4d1ccc1a0684e10b3acc840a44462
-
Filesize
149KB
MD5f442a5f8649150aaac22da62ace29bce
SHA1c2228714779b017bc449d4b848f206f8b744be58
SHA2566ed3edabbd9d4328422ca4d23cdf235f56345e653352f5efce352052dfcab8ce
SHA512bffa67ebdf03deaa16400ab3f462acade18266f932f952695d067fb0ae05b29d4cca44d4c28dae2509201c84b4997b2b899395c6619f193aa8c2ed95b3c165cf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd