Analysis
-
max time kernel
28s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2023 16:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.authentisign.com/?signing=V0QzVGp6SkRWaG5jR2FSbUFqczU1VkpxdW92dllIS29VUmRLNFBIUDNYQVY5cWxneGlUUk9OR241eVRaTjhmNFZMMGk2Y25BdloxdGhMQ25XVGVjUmdXclMrS2lhY1V6azZWaGtDaDlCdi9FQmtLaGNmWkVkNWkrREJ0Q0VLVkU1SkNuY2NEZlcxWjRxSDFsTm82cTF3PT0%3D&utm_source=sendgrid.com&utm_medium=email&utm_campaign=website
Resource
win10-20230220-en
General
-
Target
https://secure.authentisign.com/?signing=V0QzVGp6SkRWaG5jR2FSbUFqczU1VkpxdW92dllIS29VUmRLNFBIUDNYQVY5cWxneGlUUk9OR241eVRaTjhmNFZMMGk2Y25BdloxdGhMQ25XVGVjUmdXclMrS2lhY1V6azZWaGtDaDlCdi9FQmtLaGNmWkVkNWkrREJ0Q0VLVkU1SkNuY2NEZlcxWjRxSDFsTm82cTF3PT0%3D&utm_source=sendgrid.com&utm_medium=email&utm_campaign=website
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133313197441423451" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3632 1748 chrome.exe 66 PID 1748 wrote to memory of 3632 1748 chrome.exe 66 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3856 1748 chrome.exe 69 PID 1748 wrote to memory of 3908 1748 chrome.exe 68 PID 1748 wrote to memory of 3908 1748 chrome.exe 68 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70 PID 1748 wrote to memory of 4424 1748 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://secure.authentisign.com/?signing=V0QzVGp6SkRWaG5jR2FSbUFqczU1VkpxdW92dllIS29VUmRLNFBIUDNYQVY5cWxneGlUUk9OR241eVRaTjhmNFZMMGk2Y25BdloxdGhMQ25XVGVjUmdXclMrS2lhY1V6azZWaGtDaDlCdi9FQmtLaGNmWkVkNWkrREJ0Q0VLVkU1SkNuY2NEZlcxWjRxSDFsTm82cTF3PT0%3D&utm_source=sendgrid.com&utm_medium=email&utm_campaign=website1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc562e9758,0x7ffc562e9768,0x7ffc562e97782⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2020 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1784,i,13112451961141755131,1634941806431670097,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD51e3410732afa64b6f1d30be4fca69707
SHA11bb349bc1a16db3335fd7d604cd879274dceb415
SHA2560744ab492f2f8fc9c36f4d6a2f69c9c585db86fe5cf11c5e917d7b9c4c14f3e8
SHA512599dfc9b0f3c25e980b1e993c24bd2c65146cc7e71128a8b67e72a4e8beacb9f0bbe6e1d5f7053363f6abe711caf514803d3ab14754c1cd8e25362b471665a8d
-
Filesize
872B
MD5c75554aa6966276bab882c6631513836
SHA1e358dbf49425eb8fa8cddda8b2b9e892d30f9039
SHA25615ba6032a5b1f1e8216340d202811f6a0ed111a42a2f602a0429420c68007952
SHA51205e7b969a08bb5a9870579faf339d055e7105291cad10e52ce32660322a1d526e218f90151c8b352d2e5199cceebcc02c99bf14d37211e4767d6f96529109b0d
-
Filesize
5KB
MD538b717725b9623f0317940b1e0abf7a4
SHA1156bd15e9f975e5893c0068312f9435cd477f22b
SHA25660a9e242c0de1ec71851b150c166537c0cdc152a068c4f868baee9e92e65ae1e
SHA512914e3c293a9e858189f76b5346b0fc2538a2b68642c02d027c1c4adacedfb7d8e422c4ed2440ed2940815a9bf68ee6331484a3da4a30db3479ec3da51073beed
-
Filesize
162KB
MD5f0826cbf936f5dedb0107c40803481f5
SHA157efa01d48f2adc93e994fb9e41905b41d6347b7
SHA256ef3f79d5372b81dc6d8d5e8ccd130dd830092ca7b21f564895b39fefa1763982
SHA51287ecd5035d702c099041d6dde71e5faeb28c967599c8603087900f132a6ed7e80f6577c779e934957f116ebd47d0cec39aa9efa776cbdacd277bd7726d29153f
-
Filesize
72KB
MD52557a168959bba41def19e00131cc100
SHA1cbea51b49d6ff25670f7b73846fc95844f4f64a3
SHA2568a4ba6f58a5e83fba77053bd1fca6a6c860cfe6d46cf8dcc27b81671d69aee9c
SHA512a699a4a631810297eaefad0b975224e604a554bc24b74c8f3e0ca00ea227396d793003ba09ba810911a337ea05815c6da2fadca8ee1107f7aa50f6813548a232
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd