Analysis
-
max time kernel
28s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 12:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=CA31PA&crop=0000.0000.0000.0000&report_id=&redirect=https://medihealthsystem.com/wp-content/invesoi/invoitse%3Fe=baVpdGhAZGtiaW5ub3ZhdGl2ZS5uZXQ=
Resource
win10v2004-20230703-en
General
-
Target
https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=CA31PA&crop=0000.0000.0000.0000&report_id=&redirect=https://medihealthsystem.com/wp-content/invesoi/invoitse%3Fe=baVpdGhAZGtiaW5ub3ZhdGl2ZS5uZXQ=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133344147717752141" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 5012 3452 chrome.exe 84 PID 3452 wrote to memory of 5012 3452 chrome.exe 84 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 2808 3452 chrome.exe 86 PID 3452 wrote to memory of 4416 3452 chrome.exe 87 PID 3452 wrote to memory of 4416 3452 chrome.exe 87 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88 PID 3452 wrote to memory of 1520 3452 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=CA31PA&crop=0000.0000.0000.0000&report_id=&redirect=https://medihealthsystem.com/wp-content/invesoi/invoitse%3Fe=baVpdGhAZGtiaW5ub3ZhdGl2ZS5uZXQ=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff04a29758,0x7fff04a29768,0x7fff04a297782⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:22⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4636 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1864,i,15041095103599149038,4001090634922746079,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5db433fa5e78837d7c08a8031da4263bd
SHA16cd8f653977bf6b3e904b5274748a74201a02abb
SHA256e755f9f884a7b941ce491b555803ebf34347c63c7daab9544ccb95aa64120a7e
SHA5129249ce3bf6d6a2ecf7e26fdc67192f5560a68dfcca5997f81f3beab6c6529b6887faba9ca8c400e9fa94178f2d894b6da04f241226ecbd4768be1c389c8dbd64
-
Filesize
873B
MD50d9ebbf697e3dd8492a167429204d82f
SHA1bde03386a133cf06eae4290bcda00aaba68d47f5
SHA256dc2db17748bcc104daa9dde8cef16e106277728e08e50612746650ef3ea23eb9
SHA512cfc6ae9689bc27bc95903a63f66c7759bebf7112a8870fd5e297e2565f906c0503b9656613de684aaa648bedd8f2bd547ac67e49b375ede9d3ea4aaf337cca77
-
Filesize
6KB
MD559689eb9873681ac9da091f0d444356c
SHA112e500ad16d46b19004f4d6006195d5c53d1b25a
SHA2561e92c60696e8f97e8ce708bb21927bc5e656d59c2bb4c73d8f1201a2a2171b8a
SHA5120b3bf4cd0c0035a679ace55dc68cca595b140b6688d5e06c3db05f43592d2feaef165a3fc2ebe5aaff2117344182b929109ee56fab4e1fe5bc20766cdd32cdb7
-
Filesize
87KB
MD50c47ec0a276e91388500035e095daa76
SHA1d7b45b8a20ec6657544ef15e987ebfbc5b1fe29e
SHA256e321236cd90c03d8ec202d2db0aeb74dbd70a439696744a82b56421f846c85fe
SHA512fcad94c78761d82be752a9d06e9b3463ae2ce2fbc4f3790e94f538b4b7206b2f2715c96fc3136a743231a51359f83b2b420e0383b6d143df6970c16145bfc270
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd