Analysis
-
max time kernel
600s -
max time network
595s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 21:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.kjbm.themodernbanker.com/c/eJx0kM1qAyEUhZ9m3JQEveqoCxeFEui6DzA4eidjMuqghtC3Lw392bTb714453zO-3LLfYrBAhNqZIoLTdy-T9kltFd3cXM8tF4qLrXk3g57LeHmeyyZBDsarY0gaNmoNdcaKCeYXNymhK25M079fUebMM1Yp3N1uWOYyrJgJasVwYB3HhlyVAAzXZSWi1FMhEXCSEm0QIFTRTkDwYEfpaRmRK9AGDcyKQdBr5c5HfuKqQSseXb5ivXoSyKbXXvf28CfBzgNcLrf73_9DXDayjlm8lXyYcIoLY3hjHzPaJgD1imU5GK2_2ZW22ZXK3Y2CPrJW_erqxu2x7nFjj-quVRqJN2-xY5Pry8D8F_8EQAA___mYIWc
Resource
win10v2004-20230703-en
General
-
Target
https://email.kjbm.themodernbanker.com/c/eJx0kM1qAyEUhZ9m3JQEveqoCxeFEui6DzA4eidjMuqghtC3Lw392bTb714453zO-3LLfYrBAhNqZIoLTdy-T9kltFd3cXM8tF4qLrXk3g57LeHmeyyZBDsarY0gaNmoNdcaKCeYXNymhK25M079fUebMM1Yp3N1uWOYyrJgJasVwYB3HhlyVAAzXZSWi1FMhEXCSEm0QIFTRTkDwYEfpaRmRK9AGDcyKQdBr5c5HfuKqQSseXb5ivXoSyKbXXvf28CfBzgNcLrf73_9DXDayjlm8lXyYcIoLY3hjHzPaJgD1imU5GK2_2ZW22ZXK3Y2CPrJW_erqxu2x7nFjj-quVRqJN2-xY5Pry8D8F_8EQAA___mYIWc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 2828 chrome.exe 2828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 3320 1320 chrome.exe 79 PID 1320 wrote to memory of 3320 1320 chrome.exe 79 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 3856 1320 chrome.exe 81 PID 1320 wrote to memory of 2252 1320 chrome.exe 82 PID 1320 wrote to memory of 2252 1320 chrome.exe 82 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83 PID 1320 wrote to memory of 4036 1320 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://email.kjbm.themodernbanker.com/c/eJx0kM1qAyEUhZ9m3JQEveqoCxeFEui6DzA4eidjMuqghtC3Lw392bTb714453zO-3LLfYrBAhNqZIoLTdy-T9kltFd3cXM8tF4qLrXk3g57LeHmeyyZBDsarY0gaNmoNdcaKCeYXNymhK25M079fUebMM1Yp3N1uWOYyrJgJasVwYB3HhlyVAAzXZSWi1FMhEXCSEm0QIFTRTkDwYEfpaRmRK9AGDcyKQdBr5c5HfuKqQSseXb5ivXoSyKbXXvf28CfBzgNcLrf73_9DXDayjlm8lXyYcIoLY3hjHzPaJgD1imU5GK2_2ZW22ZXK3Y2CPrJW_erqxu2x7nFjj-quVRqJN2-xY5Pry8D8F_8EQAA___mYIWc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae299758,0x7fffae299768,0x7fffae2997782⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 --field-trial-handle=1896,i,2011483603788728365,1083451415546791485,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD533ab625ed6fd9d2cfe9dabcf8c29cda0
SHA16053f4e72589fbae160c13fe4e6e0c70274fc90a
SHA256ae327bd4ba6e5d5903b39b568383351ecc8fc7655484fe74aaa9227b6e9c9c2e
SHA51263d97e9835be984ffb13aee03afd170761c50e23dbcf77a386b295bbfc7727ecd360696e8d0a66892c5228a1c4a01c21f73cad2fc08923ae27892560db5a93b0
-
Filesize
3KB
MD541412d276d6ffc0d6c905f05d225157b
SHA153f8f0f703dd3cf50a32bacfaef58d8be44eb784
SHA2565536515122318c9a1ee4488851b0bc1c0f662036ba8818dadb32f0a7c7731039
SHA5123553ee42bd76f580db0c23cd3907549b2531f1db0f090b09be909f89370b4a2c7325c83a3c5ded4bb18025b6bb21b5b87c720d7e9fd2b28b37461304c15f7bfa
-
Filesize
1KB
MD5a625f985cab27a8d970108a0eea334a3
SHA1aa8d04d1c9e36ed7c0c0dc14fd04dafaaae4161a
SHA256590daa533584577b276c72b2d963cf1d08563e718466e794e21abf0651b3e697
SHA51295b27bf531ca6c8b4459be69097c73544aa2a4c824118b3c11683fb5b9949a0986c3cfd60ff80e9dfd29d80eff37f83add70ef0b36097d02495f9333bf5553dc
-
Filesize
5KB
MD5d5c56d62549a2d5f8167ecfdf8dd15ba
SHA13f11fd7ab7f93a305dc1d21b6b4da754b8853697
SHA25674929d7937535d293a13aeb653ce11bd8108767e2248a4bbcbecf9a0d67afeeb
SHA5121616d29f5b1edb364370183b1946ee4face09433a9480c3c47311c6abdf5c94f70adc1b9eb4821ca1051d0e5f3dede9d50ac339992ae59cc8d53dc525f8b04fc
-
Filesize
5KB
MD5e8dd0dd09a76130df7427f218962ef17
SHA10e569683d78fe971a34c2c749a76ed89a2c89ebb
SHA256854ad267c49cac3a7bdd9609c442e28e18bdc71c5ae0cb8ea85fd6c26ab27b5b
SHA5129e0274267bf4932102652f03357bbdb3b90adafbdaa6cd3ecd7f961096b32c51f9e957ebeebbf97095f11d0b07ac14638de98db9a74aa027518be85bcae99314
-
Filesize
6KB
MD59134deffd625a4ecae0ff99fd2d092e4
SHA1d7c18fc0c78cc163c570cfb6fff67a51444dbf7b
SHA2565412acd73bc44282bdc814e670e4352c51d9d3f3d38d17aff3ef3b3c635300c1
SHA512778ec7130dd9f7f2bfd18b939aea83a24826351f63c7d8c00c1fd1b70b60186e7a25d303669ee605bcc5e86c5af8c758052e2a0a9b524cd65036bf6d67f39333
-
Filesize
87KB
MD500277e4625217e550f677b258b2fe42f
SHA13b99c8b120bd99ac8f54f18dad3dfb7b52dd68ac
SHA256c12b690a5f7dff49b0da2fc9f9f8438dca77dbf60f918b52754d94964a27f628
SHA5123c9c6354b28af4b1cce8f2d267c09ebb66aea29f22aae6724c033af12fd1613102aacc48ab8dc7d5a386f1e76980278942c5345e51850cf90d8dd9efb2b4d3f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd