Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/06/2023, 09:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://leplb0110.upoint.ap.alight.com/web/sodexo/login?forkPage=false
Resource
win10-20230220-en
General
-
Target
https://leplb0110.upoint.ap.alight.com/web/sodexo/login?forkPage=false
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305187543052567" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 chrome.exe 2448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2448 chrome.exe 2448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1692 2448 chrome.exe 66 PID 2448 wrote to memory of 1692 2448 chrome.exe 66 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 2972 2448 chrome.exe 69 PID 2448 wrote to memory of 4592 2448 chrome.exe 68 PID 2448 wrote to memory of 4592 2448 chrome.exe 68 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70 PID 2448 wrote to memory of 4848 2448 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://leplb0110.upoint.ap.alight.com/web/sodexo/login?forkPage=false1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8154e9758,0x7ff8154e9768,0x7ff8154e97782⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1724 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:22⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1676 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1936,i,175046633958373150,9012788518202230608,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1e61d4c5-61c9-4cea-82d1-3d039cbc433c.tmp
Filesize5KB
MD52810f365f6044de8aea7e2f64e77fb58
SHA1e22adc0a031f6445ad99211b0fecdc355f2d6e80
SHA2562c5f15f473318d72d12ec0dd24df3a13925fd4ed588d2e3e297e02f8a2a64588
SHA51277874a9160a9ee9ebaad0d1aa9e879a2d82a6dd9725cac77fec17b92a5ebcbe518de6e3909f5690151fbd6727472b31ae5d7e4d099c6b899df45100147cbdc99
-
Filesize
1KB
MD5b5b4b3a21c7952bf592cad529367d9e0
SHA1631bbb21b4038e7f140b1fd69fe0cce576d9f9c6
SHA25657a5d0adf4e35e6bf709a15fdd4d3252aad40e3abf4a72605965b2ce4753c6c2
SHA512a5e86c40d82018a47a97035d6c9073ebf508ddd9a1b9c27543b884a1adff0ff537191fa8757444fcbd35491571d11db2b32008b3c5a23c9b387e2ee4f120b868
-
Filesize
1KB
MD59dbcd51c924cdb1c3327c53a2bd09279
SHA1214c636e175d3d1329886e007c43198537d41d64
SHA2562922bd57b83c98a988371ce3916a4f7eb26bdbbcdf5fdd53c01411d709d3404f
SHA512e3ab55e1f53e2caed2d7f847206e908d19668fd78b7e6a287340ac3c4250a51e12f85b75e4da3f05ded0de44ef4facfb3bdf2e728051dcdac1711a3163514d9e
-
Filesize
5KB
MD54be0982a981a60f200379ba87f8c00c6
SHA1afb558751a22e6dbe04bceb1c7a147c667db41ee
SHA256c13956732457c4ea87149e902ac842c9e1e33b46b00d8c4dc9bb30536a134fbf
SHA512e7799172a7f53af212d8003beb61194df12e2564c832cc678fe823106d0daee11d48ae343c37d5789bb3166ab35fbcc609b2d40b268cd85f1b947c3bcea0015a
-
Filesize
158KB
MD53ac8c1d7324b4e7a072ea4f890b9ca2f
SHA1382680ea9b381a4df06043b29baae71d488215f6
SHA256e3595d120312ea01cd755b4a3cb3b144a74dc7323fa8e93525f1ec94aeeaf673
SHA5123f1cf5ce971eda2bf13aac80304dccf0576cc83b453d218a9d027273b4b4c36253fd8389c4020384e7407942e92d8290782e4ae9b92a948518e943a0d117af0a
-
Filesize
72KB
MD5f516bfe172860c3ab8b8c4766672d785
SHA16a20bd1a1752b6c40af3ebdb0835b127efd0a9ed
SHA2566b8673c667104d287aa8d14232b9a3683bb061ff6300de754458590d4a81ae8b
SHA5123da1f0789ae964b5c3c93c5fdd4071b256c4a6b03c853d0aa4b0a5804f24eda88ea4486b884371d15b725517b72d312b976d1176afdfca9b1c4e1ff6349dcd71
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd