Analysis
-
max time kernel
299s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 18:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D
Resource
win10v2004-20230703-en
General
-
Target
http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336603889804896" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2532 1848 chrome.exe 43 PID 1848 wrote to memory of 2532 1848 chrome.exe 43 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 1660 1848 chrome.exe 88 PID 1848 wrote to memory of 1660 1848 chrome.exe 88 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb3109758,0x7ffeb3109768,0x7ffeb31097782⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:22⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3960 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ccaef06d00379ab0016a49fc3dd619f
SHA1aa12983f7b9ae2e23e2a6eb6c52f820be54bd243
SHA2567b9d5adc6d35f089ec83ae75919104995e9258cc758fd46220be638895db3a15
SHA5125948029bedeb1c9408c146792a2dd27a154e9226f8117f0097197e7e4ea2e5b6a081627dfc203903e9faaf20e9fbaf70a6f193d7789e55c985c0ec98c179db60
-
Filesize
6KB
MD51f97651c4aced6dbb6169cf59d8b6c21
SHA103053c311ae677edb4824d9ffe957fc61618f147
SHA256d4e4a7d03e45eec2439b79a823b9e19956dde6785961b4068618ebb488ddd4c4
SHA512c3fa571b759cc66bd575274e690ab87ecea2fdf9c10507fa34ba38a3d1b1b39b7a8c408f201f670cdebe82e481a9a52c006318ace08a0cf620e307541936f5dc
-
Filesize
15KB
MD5228d78ca2019a53bfa3180afd9ed9607
SHA1046d9bdf525615ebe3add6918264a524c8dca425
SHA2567bc35ccc6b4265346d0d478a07e20a3de7e6d8fd31eb7a13c1d96834f9ddaf32
SHA512c8681796384e9018b742d5d4b3ebd20c4cffc51b9431b00a1ab4c5c69a040718aaecc7c9695e20a152a8e6a3966f58546349417d6774fbfb9a261ef0152f81d4
-
Filesize
173KB
MD5156c6b014033f11cbe42a636cfb1756d
SHA11d8d4b278640b7eeda586baf18af9e5c56846e24
SHA25642601b79bcf9c0c7c9cb1d471a5c881b87daa56cb8f309200fe26e38ddf020a6
SHA512046cc67056023545bf050ca5ad9ed90c9d68221fffbf648f3b7449b28cc6259ceb8ae277479df5b0b1b9773064a13b685e978f58a5f243c3422aecba429ed5c7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd