Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 09:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://officelogin.z16.web.core.windows.net/
Resource
win10v2004-20230703-en
General
-
Target
https://officelogin.z16.web.core.windows.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336266057009639" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3180 1292 chrome.exe 85 PID 1292 wrote to memory of 3180 1292 chrome.exe 85 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4772 1292 chrome.exe 87 PID 1292 wrote to memory of 4116 1292 chrome.exe 89 PID 1292 wrote to memory of 4116 1292 chrome.exe 89 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88 PID 1292 wrote to memory of 4624 1292 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://officelogin.z16.web.core.windows.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc04d49758,0x7ffc04d49768,0x7ffc04d497782⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3732 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3736 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3104 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3944 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2948 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=872 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 --field-trial-handle=1888,i,12066754808830698423,14904464424892025445,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561e1e5aea7a4eef5af9d4e0567e739a2
SHA1b25b7264ae69323be28d8326c57d73b2a1a9e9cf
SHA2560e22590aa5abd1a6128b5f932ca8e335b5858a32b2c87e23c62d826078ca0d6b
SHA512201bb54ef1f5a7910e7aa67e5d77b0b95464afdb0085bcf8e8cd447779dbe658bae04944e0a2a5c6a798e0d3c21c43e0ef8fc2fcf75e861452dbe92f87736f7d
-
Filesize
6KB
MD59a335449ffa9604a030adbac12337d4a
SHA17551d75f22cb4b40ce2af940fb6edaf752ac0e14
SHA256e0e66d172a7791881e3da3be0cf0dfb45e1fb1a5130db6c8c33a8c783345c616
SHA5128bf5f6d29bcc61d0a18f5d6360be3c37afc9bf15bc0752994fa6b74aaa0195de4ed1da48bc892955d831c2838cc7d0c4a7441d3abbc3e66d07abf7dc57b4acb4
-
Filesize
6KB
MD50cb32976237769b2d83d5cbea617e5e3
SHA1343ed5b88cb3936fb7d57877cf174df90a40949b
SHA2566e88469798171b55d18e0ff9b91aed4c8bff213b1a3cf8b05cb9ae8ab0b790bc
SHA51254f5a6a53c3b5e93b30e3dd5cebd48b224d73339849854988c48f801615102902e46d32347707b200e7766f1eab0d9add920894f4281a76a9b9f665dde665f29
-
Filesize
15KB
MD5a986cc127aab992e91c0dd3388f64db1
SHA1067479c5219367b7a2d647b6eda854e9635aae0c
SHA256a0b13397f1b1bd990eaf072b28f207327d1a130fddfc6f213f6728adefd70f1a
SHA512127710ae5497a0d2e108149c60e7b103645092bb97fdc75b79154c314370db5754f377caae0a00db30c77260b59201b15e4b33183266586d1dce0f86e85bc4dc
-
Filesize
173KB
MD502d75d6f808ef42a34f336fb6b82ee39
SHA1157020f61455e8eda75345c1740feb90aab70451
SHA256af38a0c208220bcf264126be37625f7325c6c7ed9c0a24fb8afd6e971115bb5d
SHA512437c1621c6242bbca50783c2fb3891aa154909d49287423093b13aae7887b186953fd6cffde08a77b5e9f89dd08ef676a21053a4ff8c252322b40aceb0e69d29
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd