Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 20:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cPH0PR16MB42796060FB106EA0E08F083BB82CA%40PH0PR16MB4279.namprd16.prod.outlook.com%3e
Resource
win10v2004-20230703-en
General
-
Target
https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cPH0PR16MB42796060FB106EA0E08F083BB82CA%40PH0PR16MB4279.namprd16.prod.outlook.com%3e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4644 4156 chrome.exe 44 PID 4156 wrote to memory of 4644 4156 chrome.exe 44 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1760 4156 chrome.exe 85 PID 4156 wrote to memory of 1356 4156 chrome.exe 86 PID 4156 wrote to memory of 1356 4156 chrome.exe 86 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87 PID 4156 wrote to memory of 4388 4156 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cPH0PR16MB42796060FB106EA0E08F083BB82CA%40PH0PR16MB4279.namprd16.prod.outlook.com%3e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0e0b9758,0x7ffd0e0b9768,0x7ffd0e0b97782⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=312 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:22⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3756 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:12⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3944 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:82⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 --field-trial-handle=1792,i,14736674888981823562,15666452538712909592,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD52bc21d8f278fdc59a93f4f4f582ce058
SHA11c0d64b18571c0b53296e804643ff14901faebfa
SHA25686f54bcf644f3152ac85f179512ecee48891816969c78188278ef214cc7d5a53
SHA512fdf25bfa592ebbe10df40c7ad1f3ea2a28035add5f154542c13b8bc5e7c2f09cfe4478a612c7e6498806b3c8831cf213b2753f9298be67183200baf79c57310d
-
Filesize
2KB
MD5979e930120491e8a65c098e4841c29b8
SHA1b22380804b1ace2de8b964db8222f0151ac0a1bb
SHA2567cce6e88004ed37c4b1224acdf1269c45a0d85b672eeffad0b2e63d3cd4ca7a8
SHA512075a26a24a73e0fe25cbeadb1e977eed0e17da143173a257d640398017436868aa3803d04148c07833edde0515e41262511a10d5fa53b41b099c80673a13a161
-
Filesize
1KB
MD550334c86533d28c96fd4acfe3500f2dd
SHA1e492dff1b744e41a6fcb4641db2ca782b3446749
SHA256d216a045cd0c8185bb6fc439a89e9a97ab9fb164f293ad94ab3f10b54c4bade0
SHA512315f4960393c0d4053d0eb5e261668ec6cecc84ce8efcd2826578203babb679bf15fd8ebb876ca981fb51fb92dfa40276c8c93071cb1d484d7857c166f27cf90
-
Filesize
6KB
MD5a0d024eb406dc0c2866090d27f5a4c9d
SHA19ed457d613f3da68efaff842fdbb6e25665b97c0
SHA25668b85d2ef79aea9fd56fea7aee9be780700bc1f922075500f545cdabf43e165c
SHA512e617ff1f2e2c4ef2472aed543562a714156ec6c77a510b9cfd48b21af2a0d69c732c15081d556bdf53cd89a5b832e64a65fc78e2d931fe5402f049407dd451b7
-
Filesize
171KB
MD53afa53efe65864bcf77479ed8eda5bf1
SHA1b6df0381e97f22967e85950608d5e734a4aeb3cc
SHA2566083f485e28873e8de2c075d60afcacbaf8838f62e5e485d6920a92fe5f24918
SHA5128a07fefda09268ac555b5207e36c141bac3433652a2b06374b34c7e663e1a046d5ae5f6485774d6db2616dc4fbfeaf68f54a8d5be05ad9910d99fc31b3de8b60
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd