Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 17:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.box.com/notes/1223236157919?s=qjlnch6enqzpagqtx0y6k04zhlycohxm
Resource
win10v2004-20230220-en
General
-
Target
https://app.box.com/notes/1223236157919?s=qjlnch6enqzpagqtx0y6k04zhlycohxm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133298546247630301" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 3432 chrome.exe 3432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 2800 4012 chrome.exe 88 PID 4012 wrote to memory of 2800 4012 chrome.exe 88 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 4944 4012 chrome.exe 89 PID 4012 wrote to memory of 5076 4012 chrome.exe 90 PID 4012 wrote to memory of 5076 4012 chrome.exe 90 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91 PID 4012 wrote to memory of 4236 4012 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://app.box.com/notes/1223236157919?s=qjlnch6enqzpagqtx0y6k04zhlycohxm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3929758,0x7ffec3929768,0x7ffec39297782⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:22⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 --field-trial-handle=1812,i,9890523723085159752,4178916468862045252,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51e3c956ecd90f28706640c0ba0d28d9f
SHA1a7e0307a564db42b4f16189fb7331787218dff15
SHA256a77ead18742b91e89879fc1fc65829a79f685969ff8f061e10c5f7b98037c169
SHA512891fe71c71e33970407db4df67bbe9af13e735f9ffdf3f3d61dd171ec7e24d1d59664fea222be3d80e9ac11efe128b766e4b17e8e3e30129bac404881812e449
-
Filesize
964B
MD535d19c2b39c52ba48e86f4ad014f852c
SHA149a152bfe90708ddd5284ff335ead8fff003697b
SHA2566192aec4240a0135b5ed852d4d6ffbc1af341abdb8c7c291318d4c7b2b99cdc5
SHA512aed426d4bdf111406f132457d3b74497d0a64be76ed48a735acaae973df8bc47b92773408f6ac6785e21689b338dd6dc496ef39ea5a292e1ffafda7a19e06b20
-
Filesize
5KB
MD591068d34c1a3aed535e16ea87e1bb336
SHA1abde360c607ea7a9fa25bf4febca41fb598b4501
SHA256ca2fae9abeebf377e7632e33d363ebd87fc73fb099cd60b6f0c78ce965e6722c
SHA512ac002b5e51360e3d91b9539aab5414bc75f335822f593c941bbdfe5f6fc5b56e740fa159f341fd98e342830c292aed4f5cf576885cf6fd0554bb3b697a994a5d
-
Filesize
5KB
MD50e68a6afc4ea9b97fd30b826af6650a4
SHA1160583607eb8c2379a943f706bef6cb25019e620
SHA256d4d2c5226f4644f6c198feeeaae08c99a665631066ffe6d0dd67fefdb0c33854
SHA512880d4431ebd77d9439d7c6250c8e3ec4957a8530810bddfc994e485b5ad0d30e0e19f4e7b07c0f529524559db6d50825bc936a1999144006e2feabc243329e7f
-
Filesize
6KB
MD518145241c630461d5780d7b6f20d000a
SHA1fb5d2a6bac3bb0852c3fe0836d2a30365f9c3756
SHA2569712714fc73012693ff1bc72f561c790dbb5cc306c9da1ace434e8830606ba28
SHA512a7def097771b51bf5167ac58f8681dfc625cc81248300bc41a2762753ac99b44eb7ea0dd98927f9f03b74aeda03ccf4ed099647de517ef7c2e1737e12f4a56e2
-
Filesize
154KB
MD5ce8a2c5323b0fc5ca12218202e1c08ff
SHA14e913c457c96f496b85326f48c12f83313eb6dee
SHA25672b9df902412ea1c7620f2ea26231378196f8f20df454f6f2690a3cf4c5ae9fe
SHA51279c6f9a85f8ca3c6db68623f6e7b6e3cbc1bad94fe78997cfec62f03796a3f9f1fa8be45fc5e9fd5d26e0c151f73f3c87691c1cba517d32857a61622ca41291a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd