Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 10:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://goldbergsfamousbagelsnj.com/macro/?integrity=bm9ybW9uLmNvbQ==&sso=bXBlcmV6cw==
Resource
win10v2004-20230703-en
General
-
Target
https://goldbergsfamousbagelsnj.com/macro/?integrity=bm9ybW9uLmNvbQ==&sso=bXBlcmV6cw==
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{895BD962-F206-4AA5-BB6F-4C4806BED52C}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336320513038908" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1904 1596 chrome.exe 68 PID 1596 wrote to memory of 1904 1596 chrome.exe 68 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1436 1596 chrome.exe 90 PID 1596 wrote to memory of 1312 1596 chrome.exe 91 PID 1596 wrote to memory of 1312 1596 chrome.exe 91 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 PID 1596 wrote to memory of 4440 1596 chrome.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://goldbergsfamousbagelsnj.com/macro/?integrity=bm9ybW9uLmNvbQ==&sso=bXBlcmV6cw==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff936bc9758,0x7ff936bc9768,0x7ff936bc97782⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:22⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4832 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5304 --field-trial-handle=1872,i,10454532157176077473,4699849685326722496,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3924
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD534031bdd36d379e3df26569c0f9c64a0
SHA15f53ff9e6760c3f741e4c907faba0d11c5ea5d41
SHA25621fb3890965eb9ac1f5d8ea62c52be6422b07cb97913c71f6895d3e0f0a0e526
SHA51288100628c80f9d258d8a143d3fd8ad6bcd42043449e6b705afde84f299cd6e73f2bb28f855f33399069e3f8d64f2339f1027a8a509a5c12c0fe31b3d440b63ea
-
Filesize
1KB
MD57f113f4966b041899674d7674f977162
SHA156facfc326a157782ac291b98571b0984002500d
SHA25681bfe319575629df6b9563097e4c7b9ca362da3fc70f54f5d9f910eb17569213
SHA512a595ca3df33504ae432f34fefc3d96e32099d1b9f84bd4f224c599de5ebeb31cdbf201acdd4a2601130cb2f0e6ed30672f52d82f2645537707ab7fe09ee87270
-
Filesize
864B
MD5c30ee83b3faba1896108691beec5fa96
SHA15136bbed02412a034d9f941f1185b80c693be948
SHA256c033f2b2ac6607000ff72ec6780792dc06b870d018339f99721ae86bb6fbdb60
SHA5122554cccb071d9013216cfdb445d6d872acee8f4305382367a142d17d8f48aa33b8a1e43905b125bdf1ecaec105d6df2375bb21f791d8a54b0c9a7edb728cd4ac
-
Filesize
864B
MD5cd6c15085e560b7d3c7fa26abe74eafc
SHA129f3a8ee4fb9743e036c9e025d2a862313f0bc7b
SHA25627191df3e11b78585b04ec257c59d02b36dce49d48ce4137eed53e9cc38d1b6e
SHA512557d475123f6ef204d0dc5f18ff31066144682cffa4e07452cedcfd2fe56dc15eb6f2c1ae09ad9a8a6d21ac665098cd6811cc672ee651ea959bfb0227751e2c9
-
Filesize
5KB
MD5f4ea85081ffb610125244b0444001c1a
SHA1ff18c0050cd924e57969465f37c9e71175b7ddb5
SHA256734031d3e5e12ce0b9333895b03e7d90baceceaf5dc97ed8d64af8dfecffb4b0
SHA5127d532b03185a5327d772859f32f6e6e78a3df7b3d5d16c09dad036e2fad4621b924bbe19c98ff89681ce9b4a7cde618db68f0d7b392515d51a5dbea88a2963cb
-
Filesize
5KB
MD56fd0af655c2f8ad0c95eabebcb662856
SHA140dabdf19b43eb4eaf03b9c2d2f55eef23a73a8b
SHA256d3fc82b22cb41ab5c637494ee4d5373b8401baeeda48c8f7ff51350fb448c59e
SHA512fad17b2ea29573e4aacce96053f0161f43eeaad923171dc252284af928fbb01952199cdd03f77f13faac4d0c714e41617e60d37e014ad0cb04e2a5a489833ed8
-
Filesize
6KB
MD5fd937c12baa4f823d002848df3d12dfe
SHA1252f69666991377fae7489fc44175d5a47b27fc0
SHA256c71fa53b79f0771df56226ce4ad681590abcfdce0fcdff7e4d5b07e4c13f5d1f
SHA5126de0b1234f8adb851cdae9a691349e9a4ca9f1b8f2921b234806d240a20a4bc99680b1a3fc02a40d52644e023683754045c949db9e20f453bfb4369151629e2e
-
Filesize
173KB
MD55e33c99ce4144b513abeba21f77057cd
SHA1060834e9ba5b919ead259a53c5d02148ddbb1122
SHA2567d7bbbcc7145a3861371ddc23ae8ea5c5af7777a64109bf3f87819852b854fbc
SHA51237a5dcc24be791af1b99003086d44abff0c6b913f9787011ee27cb61f7f37ed00764b5a449d891f1b017e466a42337e44d06e11755a3ab5b7803f073d70ab2bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd