Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 06:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-au.mimecast.com/s/7hFVCp81L0CnlPoYhPmMqX?domain=jpmchase.secure.virtru.com
Resource
win10v2004-20230703-en
General
-
Target
https://protect-au.mimecast.com/s/7hFVCp81L0CnlPoYhPmMqX?domain=jpmchase.secure.virtru.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341355516225832" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2328 2620 chrome.exe 83 PID 2620 wrote to memory of 2328 2620 chrome.exe 83 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 1836 2620 chrome.exe 86 PID 2620 wrote to memory of 2768 2620 chrome.exe 87 PID 2620 wrote to memory of 2768 2620 chrome.exe 87 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88 PID 2620 wrote to memory of 2868 2620 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect-au.mimecast.com/s/7hFVCp81L0CnlPoYhPmMqX?domain=jpmchase.secure.virtru.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff867169758,0x7ff867169768,0x7ff8671697782⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:22⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4812 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2444 --field-trial-handle=1868,i,2173606222660073591,7384322482430662470,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5d12fbc84381b64a825c92ae5fdb70071
SHA1fd73f8d7a32ab37256cf940b44e740b2a32fd0d3
SHA2563d789d8bd9b233139b7a8957488e7ce46ce89651e98489a24fd539a3e7049199
SHA512cc520e88296a57b64fc0a801d5823dd6720cb7b87bfcbf51c4b0359b5bf29d123cc3efb065ca5a8b06f45a30a81283ab8c1c78a26c5ce05a1b2787c972ac9279
-
Filesize
1KB
MD547ba714bb6c9feee6912fd4ce2436d87
SHA1b1ad3b2b9326fdbc80d2139a5061c3cf84ca3955
SHA2561bf960f5ae2449f68bc533e2059e2f51e84d6658168c6868534540d5704b23d0
SHA512108ab9799153be2fa649ca0ee8bdba4ded82adaf98d2069f546ea2f79a338b531a1a9704d38cd786a3581c6ca5a186234cadca01c46b3bf2d16abd45a63580d1
-
Filesize
1KB
MD5032d960b887a8fe66442ed516d75bdee
SHA1656c494e96a1be008feeeb7af7c8f2bd1e5eb9c6
SHA2564e8bcdf867aacfe7d144368734c74f8c54592fdba0e3c50377a57da3d63d7016
SHA51205bb299fecceba8b6a48631dcaba3d74683ac0e2cbc61b917fbb6333d7277605de749e8c7c6aa0b747408c89839c47680e03feb3359db58226c57b088a31bdd3
-
Filesize
5KB
MD599b6e17f151adba8713933f9c28d46d2
SHA12bfc2deebb45a10c65644b8c220fde7f43f9b873
SHA256aa6f0d6dbdd6c1bc233786bfe25a9681874d5556ace7ac0d831e62593c7ded41
SHA512cfce517ccc754ad5342ca7fd78b85a44db4936f6081e8eca3d75a69f7467113d858ddfa3b4af82dc573e9c2aa34fa0e5c69d48bedb5714cad92ce4712bf0541c
-
Filesize
6KB
MD50d438404f940bc5c65d78a93dd17d54b
SHA178723eacb560796c9f27ba2f5c5cf39d9780a3a3
SHA256e3f021fce52d819e74ebef4e0d7caa1e67e1bb6b734b88304eaa77e32fe1f098
SHA512b2567b3d164310d4c9242cf46f6452a90e2373d58b1e136aabc75b230a05084a76cd5babe36f6e4525f4a42e0e05a9403b870a8f63ecd85931d069abc6598ad3
-
Filesize
5KB
MD56b8e98ba823741538d636315f5881421
SHA145fbc1e2284dae92d4525be1749ae9bd7a19da4d
SHA2565a8ab9bb87df4a647c8819fe57b9a18db3f7783f3bd1c77bf929c12db482768a
SHA5124c4b9b1c36083c555337945c8815f74eb3b02e519d08fb82198d586abce247a1b806d21c71cd202f181b265c8b29fb9549ef4aa4b5ef7d64c6e9eef0b6cdf733
-
Filesize
5KB
MD582d9598ecb5c0fee133718e2208b35c2
SHA196f8bb9d55100facca81e20c29833d8dec95fc19
SHA256c32a120e95dfd89736c46f0af20214b1170884dfccf4975db51b1ecc60dd4ada
SHA512c1a6e53c8a33425aa00b625424cef16951de7576a4837432002e94f920171907c0a2cae9f64fb5a5eef9b706bae7442eca6242b37bad84e16ac13446bb72c24a
-
Filesize
87KB
MD5fd1025339d67fa6450a2e4619fdb052d
SHA1370badd14b248ca424a3f90734e2d698344810c8
SHA2565a61c877e01e07e836dab1959bced4d4893a61c31189be77b16c611485f17b41
SHA51271e08fe8eedcc9038cda5c6d7d0840363c75d67812fe0cf09a5e447878d7aad80c5610a372bb3efe0edc18f483aa3c39685ede3286d23c8bb5c7139f0678c95b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd