Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 15:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.manageengine.com/products/service-desk/faq-general-modules.html#Validation
Resource
win10v2004-20230703-en
General
-
Target
https://www.manageengine.com/products/service-desk/faq-general-modules.html#Validation
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133345118762300131" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1424 2680 chrome.exe 82 PID 2680 wrote to memory of 1424 2680 chrome.exe 82 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 468 2680 chrome.exe 84 PID 2680 wrote to memory of 628 2680 chrome.exe 85 PID 2680 wrote to memory of 628 2680 chrome.exe 85 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86 PID 2680 wrote to memory of 3908 2680 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.manageengine.com/products/service-desk/faq-general-modules.html#Validation1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef219758,0x7ffdef219768,0x7ffdef2197782⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:22⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 --field-trial-handle=1828,i,18042224097664412901,12544725261558713441,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\922358be-514b-461a-9d91-df071561fdc0.tmp
Filesize6KB
MD58faa60c1e78dd9c8b6adb9f526ab7e29
SHA19b67e4c0ff581b3e6ff191e3a29c328ca9e02454
SHA2566fa7f2393bd9f9bf762d90460826808440d69f9f405bc1964a9bbc295f6ece93
SHA512da9b9a71e131c935fdbfabe116c7408467f1c08c866ef75a2b1673c570d5013ab16603211101451190fc4ed543b93375d90e30cc792d0dbf2c4f8840c5ee5c08
-
Filesize
288B
MD5e85a12edcc00ea2fdaddde06a5aadd98
SHA194f9b6c4b0941d60ee2d6dca63afd13559c52a6b
SHA2560c1fb58d1610670e47ced69735e5fb519814a5667309c4bfa8a9b462a2b1aac5
SHA512d22f90b3d7e636976e647efc299b39a632bedbb3f91b2fe8ac18bb75e1ba6485e59dc8ebaca854c1c38a60ced71c6b06bd40f7d900481b2a8ff1e95c5f1c09a9
-
Filesize
1KB
MD5b489c4d3666634b74754c1b937346caf
SHA1750805c5908c8a4e6c23c3f8a9249335ca9069f7
SHA25611eb3b4282ae434622e54c494aba27abf6cc54a4c7bf98f8bf554a7d3d9bd4fd
SHA5121ce6da386691523619af50ca311312a0063ea4e19701a58db29b2260d291cc2623aea8d6a823baf52dc956b100b4d461a6b65b062f22307db2738a160965230b
-
Filesize
1KB
MD5bcde2dcfd6dec3d68bce242a5e8b3e01
SHA1c0d0c11e41cc482fa1e877e108b3d11eaa3b3b8f
SHA25661533974a31ce66c52ac3173fbe8b9a32b2f1fccab7afad7f5051bb4ff0c6bd8
SHA512d75dc2453b93b4122970932482d12810c1a22dcb0754a02b47d37dad22b0dacc1bc1617d578001606d9ab3b50b054b347dc793c0980a2c16ebc30614efa2db92
-
Filesize
1KB
MD530a16ca457b8dafedf3d07eb89860671
SHA102ac195c1f80e666c893c9fa291871fecbc8363f
SHA25649e66d6f29f35efa5e4a29979066fe6d522bcd7687700f76011093b9ab8d557b
SHA512f69aa06ebe70470675486d5978b310f81a2b8a45c0d2da04aba093ca2014ec991b94e486456f60ebc45d9f715f176b1ea2dfdf1aec9f1cf394dad44822959a47
-
Filesize
6KB
MD502beb24d1446316a13b99a4cc5b2ef13
SHA1301336807609311263a0b86fc33de833051b4950
SHA2568401868746798cb8150c4f834bf5be4bff6b9946e529eb1911ab8a1b7f3fbc18
SHA51230652ba73f371b3ef7f05d9e2d3586e3f1cb851c2abeb80d1284e52aa546baa997da10af479cb7d21d08d40a1fd9d60dad53b17b3eb2748ac8a6deb51ac49b1a
-
Filesize
6KB
MD5d66e7af948cce7750be8bdc4d49fa746
SHA158659fc12a55882d40154de0bb0a5a95368ddcd1
SHA2567b5402bfad133adcdf5418fbdab391d9921901d09e18d2fbba4c9cf304ccc35a
SHA51296585597d1cca646fc4a26109b75672d7af52bb8c03437985247d0bce2e16eea4f61e3ee1ab9abf19181b6af2c95b24b53a9a2204758347fce998e38ab3a77d8
-
Filesize
87KB
MD598499dd68565082f641f81968ddae4e2
SHA150504c868fba721846e4912cbd6ef6d63eb4bd1b
SHA256c5ce1fc7aae0832b3d24f0b02954f1e5d83bb587e63334221ff0f315ffe78e6f
SHA512061787dd36e8de49a5098b6abfa564ae25a0e5b7990c98a174c5cf6047f95fa46f2ff90b19fa30deecd666dcc09a4e735206c83f708e6791edcaefc99df353b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd