Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 17:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/mdkyCXD0lRCXKE6xC6nFZB
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
https://protect-us.mimecast.com/s/mdkyCXD0lRCXKE6xC6nFZB
Resource
win10v2004-20230220-en
General
-
Target
https://protect-us.mimecast.com/s/mdkyCXD0lRCXKE6xC6nFZB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133282207320017220" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 2304 chrome.exe 2304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4268 3980 chrome.exe 66 PID 3980 wrote to memory of 4268 3980 chrome.exe 66 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 2052 3980 chrome.exe 69 PID 3980 wrote to memory of 3188 3980 chrome.exe 68 PID 3980 wrote to memory of 3188 3980 chrome.exe 68 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70 PID 3980 wrote to memory of 4476 3980 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-us.mimecast.com/s/mdkyCXD0lRCXKE6xC6nFZB1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcb8829758,0x7ffcb8829768,0x7ffcb88297782⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:22⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3208 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 --field-trial-handle=1824,i,8851579002210069499,3619198665315985241,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD54c4aa0f9c62dbc401ccd691ee9abc07b
SHA15498d764c7c9831396d805871c246ac75ed76e0d
SHA2566b84c1d693a8b4361d17e4be741c1b78dd6e79b3b3343928e7db28608e850465
SHA51217aa1f1c9a0c0f3be3bfb487b829dd71fd8bf416263b7a0ef82889b79eacd9f069f5e6aa56e194e04b877d2b5ee305ebbdaa716f357b2236b0316048be9fc23c
-
Filesize
1KB
MD551ba469d778b68cdb25f459f28956f36
SHA14335fc249458ef4b2bbc3dfb37422e8c56e13b3b
SHA256ace8a3fa669fd1a63fff77c22646345d2c1c31385026ff979d461f987125bf21
SHA512ce79cc382d5118d54579a8edac17d389562ddbf77a9ecfc4baf609eb202441922e656a1c0acd2f7c346d4b917b9d6996e9936a35f57e434a2ca523194bab4776
-
Filesize
1KB
MD5471a6f456855dd288f8f4cb5325300b7
SHA1c6d55cb627fe07a7a429302f24a636ad07b0685c
SHA256a60302d1b252f003db3b268d57f4fd0f8547cbd57b88b50a6b9ac57c54b66c18
SHA51217016ba94c36e8107ab8a4f113c350b310709e04a7c77342e733b1ff80e3b148553ee753e1b30166defc5eae51aa66689e74f3a25211c1371ea350678019ea19
-
Filesize
5KB
MD5ba4bfb9be238eee29fbaaee0984ca96d
SHA16c255420738aecc98d792818e54bcfce421b0d79
SHA256dd581938f1868a8b204ed07546b8559c1a2b7ab276776a3589edaf0cac8ba915
SHA512f949710cf88038ce72fd3ad09dc9eada1b81ac00a73018a13573f31b1fed2ebd562c45c0d0ff2f2af00b633becc7a36933d04b5f105ff66364c122ea7cb76913
-
Filesize
5KB
MD5076b44f7558f61051cb7b4b58b14e278
SHA1b9391ea13f7b9865fc185f2634fcc9f89801a342
SHA25631a36694b70ab5783c7bf620d5e81abaf4a9be6c21a80ebdf2e1050e71ad5409
SHA512d43ea7ceadae76325306204992b4f784c5a435936787efe161cc4a6545ab884e4870cc6b33cf421c7cd1a985a96d896cabc7d5aa06b2e39061ee2c47101981b1
-
Filesize
6KB
MD582c9615077fa36247794ef14c0c00852
SHA18d884164e1daf9b8535c8091654e96d564dc4906
SHA2561285fa3e86b857f0b9665ab9fcfa7216d33ed0d00819a133de1ef8ccd6323c87
SHA5128871fc962de61687b75b2c3692f1598ee0fe06bc130a9f11a0f212f8aba722fda3f855bdfe9dceefa43f5fad7ac5b2ab866d699c2de974ddec635000b9b16c41
-
Filesize
12KB
MD52a3b219ee44c49696be41bda0b739b3e
SHA1e2265afa2f1662981a82c78f8b2c7ffa06943129
SHA256b416d58eb80894382dd07d1ab379d30015afdea54bc8eb25aab38ad2b0daefc8
SHA512da99713b3790fc8e7f1f5d9445c6b652ee6e8480f2a413f28416597269df897747e10f94b311f404bdd6784420e0bac2649fc038c6aa943c73d9695888a212f2
-
Filesize
149KB
MD5cc4aacc9444faddd65df23bce8750ffb
SHA1d29a43c890bfb4eb0a011d5a32aab05f4848b564
SHA2567790e084ec9f07b03a0431f8eadd4c5be61415f4a8e7c2e17ab8d82601479248
SHA5125dcea4ad1dfd2275f1ad2563c1e1c10750ba296e70430b7a995b5e1f8d59c4f5bb9e014fcf2c983171b9965e8387dd07e97d95c4fca8bffd18bd71709d4d7af9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd