Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 14:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.key.com/mortgage-loan-officer/590019/Michael-DiDonna
Resource
win10v2004-20230703-en
General
-
Target
https://www.key.com/mortgage-loan-officer/590019/Michael-DiDonna
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338176418841217" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1216 1852 chrome.exe 68 PID 1852 wrote to memory of 1216 1852 chrome.exe 68 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2296 1852 chrome.exe 87 PID 1852 wrote to memory of 2356 1852 chrome.exe 88 PID 1852 wrote to memory of 2356 1852 chrome.exe 88 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89 PID 1852 wrote to memory of 384 1852 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.key.com/mortgage-loan-officer/590019/Michael-DiDonna1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff04479758,0x7fff04479768,0x7fff044797782⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:22⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1912,i,2619297593739752356,12826627978566472729,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize290B
MD51d0a52b7c01db15a0fdec7ae07558c01
SHA152ace199997d0b697476994ed8e0d54236a99902
SHA25629ea51a34be548772bf4894eb800ee557e2a536d87cbb5dc467d8434bc567eb7
SHA5122f18fa4cb80be14b10874d7c1b576ad505745f73235e590999cf1498ffad0918a3594546008b1ee41fadcbda86c6b22c6f80a3ab5d985de72ccb6bd71af7c3d9
-
Filesize
288B
MD5b7e6117a088dd6e794d6c6f86e775e4d
SHA133a0f6e3b3649c1c45108bd47688d72e4e6c3de6
SHA256d395be85bfff242f40354da4769ab993ee19f00ee50bef9af2d7886f2d304231
SHA512817e73f60cf6aa8f936bf0b8f6de87b2b54174e10989cb2e9e903bd369314bf885a18eba9d81b3f65f1506056216f8a832dac6a32b4d1422b05e72efb0e2c5c7
-
Filesize
1KB
MD56b7c2b00468fe2a8f853706d3cc3ff8a
SHA18c8e34458213686c7913d90fd4ae454070a9a22f
SHA2569ad96b07fbad33a4321da5e5c17408c722d2bcdd09e7d9e0f36b531ea1ba2fa4
SHA51261505c5ca08511221e47b74f7f819147a46d25a0b0eed03ce74fdf32b2a87df7bc4fa0939cbb8ab73893aeb1cb7db0cb0515d683487fc00ecd91c6b53432c925
-
Filesize
5KB
MD580a469aac7bab6aa99d127a6fd74c0be
SHA10d132e394e632490dc98b91c28a2becbb577e04e
SHA2569b65939ca158a4d5a98d2b989149dc213c3e87271d28b5e3b457c62f1593152a
SHA51251b152fcce978c13b4f28564cf34b220ac79a0e47b10f75b0c85010d9dada95934e1ada9d7ef9819e328f3bda551ee8514e52c95728a7c0182a44ac444cc3d91
-
Filesize
87KB
MD58871ab2faa9d46021adccfca657fd8c8
SHA14377363e4144c22aae2c50c3074a7cb857773f92
SHA25603bebe4749f19147873d30e4a8a097914fde4ee933ea52ec1448338713bc2cdd
SHA51277b16641c7886d04ac9a3d43dc9e9e6101eda5c6fa7a8f5c47b8711f9238b72172e13fa82437cf84eb820ced0be3d09fd3f0c53684c9d8608d9fce369bf4110f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd