Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 12:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docsend.com/view/x42mcs8zsrzz9wc7
Resource
win10v2004-20230703-en
General
-
Target
https://docsend.com/view/x42mcs8zsrzz9wc7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338113102281659" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4700 chrome.exe 4700 chrome.exe 4248 chrome.exe 4248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4700 wrote to memory of 4196 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4196 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 2356 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 3836 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 3836 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe PID 4700 wrote to memory of 4112 4700 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docsend.com/view/x42mcs8zsrzz9wc71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a9249758,0x7ff8a9249768,0x7ff8a92497782⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:22⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4540 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1888,i,9467811552581459633,16332151573579177709,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD502c01c2c29d7e3ea8bb5762d165514b8
SHA1071d14b5ef2a773d57feaaa167f47328e37dc487
SHA256bf4a0e5a8c8d93052216a82b6ffa514df3e70290e0d13a4281ebec029f32d9cc
SHA51246c293c1896cf045aba161c800becfcc09e88d99728d1c2249cddbe21985b20a61fb16f0a56504b6853d640937a2b48c7048c10c4b07883ac06528077843b929
-
Filesize
2KB
MD578429d9b3ecb98c131361353367ddad0
SHA1a29953c4eaa9887519f55ac3bf3ac2f0e8adb36d
SHA256982285340a17bba7a340c861a0f8c099f2ad6817aced2f1fb0b334441eff7681
SHA51201e1369f57f995a5dd6dc5f4b13316d6c1b4c661034fa74d544026c94839739151f8134d51089c41c06c4d19dcb76acd91a0ab9af4ebc0b2a16027d24bca1352
-
Filesize
1KB
MD55f4a371cc1a197fcfdc08d26430b1372
SHA1e518da705184155d90e02ae8d6d3101755213de5
SHA25666d0c8092bed80d324d79d24d1b6bd3af686af0b60e330a777ae6de9e875e7fb
SHA512f4f62f0afb5b1606c7d6a1ef344f6dda0c6c7992d60c690f53bca2cfde131b37eee5d4cf37617667885966a46377d15f38de2ef534eb47a395b4b27571315788
-
Filesize
6KB
MD5b2e853b8a3bf1e33ded869dd04c5a136
SHA1bb4b3ca6c390e80e2f53fa753018c9c3bcf41c9e
SHA2560c15d3795105f9d0dc68eee71f999580e362c18230ae1c8451a02b2727488a38
SHA512b6053009e34e402dfa8bdf935bd942b6d5422c979af7529c985fb4468f576c6b80de2145f0b61431feb78bcb8744ac48359571975eb960562665cb2d561bc3b3
-
Filesize
6KB
MD56c95f3a8fcebf1fb8f96353c1e228574
SHA1b0eff90dbe500863d69567ccbbf7771b037f346f
SHA256359a692f18a7e89eb03b26c807bb921dae682fb9e2c23ab47a97916900835bfa
SHA51218491c08ca0ef648c3a01bb11b434807abbcd5d84336d53c9d05904e63377791ca23b6e42731faf03717331ff516c244f2096f39be5a69f28c834b5b6eab9b73
-
Filesize
6KB
MD5e81e18c032462da9a4bbe602be85d808
SHA1655e6aca5bdf187e27a195a5bcd419f248056bf1
SHA256c9e71d668b68eb045a1d1f3f45db7bac02522491b81630ff6a9a420c10d79761
SHA5126673192a3f892f1f219557a06fbbbeeb9c01f31183344bfdee27c341be29d4471dae916499fd99941cf1b7d0a2d3ad6330b1211d3000f6d6d26582985523748f
-
Filesize
87KB
MD5ccf09acae32a317c124d1f9f5dc99aa4
SHA1004e46e0a522098cb74a1d3cb86b697ed9815911
SHA256b452fe3d9d45dc4a0f3c3b7f50bb5c81dc6ec4449af8f666c9294b5a104f8826
SHA512292b0e092b487d3ace7d7f37d4b9a7d7e2043c4cf260a4fdfad867871480af4dee0b64d8532c9289dd8e85705cd91a38227228bc7a90239b8168d9242b5402aa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e