Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/08/2023, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://us02web.zoom.us/webinar/register/WN_iG94EGahQQaN3nZ9PZtBJA?tk=CRMAV89_KttfzyFy9ay89uxCDsedi_kmH4wNT_AUhiA.AG.v20suTG5CCp7wKX0emPW-bZBrxFzKdUIJmB5V8g2WZ7f6Q8kf4MfI8iOPRXabc02Uh5D_blEs5HSmHa3_rIEBPjIkiWbfY8RZxg.3DgCb7qtrGpQC8LKIsj0Dg.uVnH_tHnrwN_IgvD&ac=cancel#detail
Resource
win10v2004-20230703-es
General
-
Target
https://us02web.zoom.us/webinar/register/WN_iG94EGahQQaN3nZ9PZtBJA?tk=CRMAV89_KttfzyFy9ay89uxCDsedi_kmH4wNT_AUhiA.AG.v20suTG5CCp7wKX0emPW-bZBrxFzKdUIJmB5V8g2WZ7f6Q8kf4MfI8iOPRXabc02Uh5D_blEs5HSmHa3_rIEBPjIkiWbfY8RZxg.3DgCb7qtrGpQC8LKIsj0Dg.uVnH_tHnrwN_IgvD&ac=cancel#detail
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354613177939686" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498570331-2313266200-788959944-1000\{366C76BB-5CCB-4AA6-BE9D-85ADD76EE342} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 212 4916 chrome.exe 67 PID 4916 wrote to memory of 212 4916 chrome.exe 67 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3924 4916 chrome.exe 88 PID 4916 wrote to memory of 3484 4916 chrome.exe 87 PID 4916 wrote to memory of 3484 4916 chrome.exe 87 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89 PID 4916 wrote to memory of 260 4916 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://us02web.zoom.us/webinar/register/WN_iG94EGahQQaN3nZ9PZtBJA?tk=CRMAV89_KttfzyFy9ay89uxCDsedi_kmH4wNT_AUhiA.AG.v20suTG5CCp7wKX0emPW-bZBrxFzKdUIJmB5V8g2WZ7f6Q8kf4MfI8iOPRXabc02Uh5D_blEs5HSmHa3_rIEBPjIkiWbfY8RZxg.3DgCb7qtrGpQC8LKIsj0Dg.uVnH_tHnrwN_IgvD&ac=cancel#detail1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4fcc9758,0x7fff4fcc9768,0x7fff4fcc97782⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:22⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵PID:260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵
- Modifies registry class
PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3932 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1904,i,3962920666730045793,815831142357895967,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4328
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5825c53dd8da2531616032e4c4e0bc7a8
SHA13fa62d7d375aa0fbdb43be92409b96337099f3c6
SHA256d175e28147a3ca2689108edd91a4f2f76232f76beb3dadcf74e0aed2bda3ce51
SHA512b642c9f3757ea2133fb5b9dc26e5a56fd4e35f5b23e6f4e59b249325d6b61a9e2b9647bcde19fea1fa9b4a619f339aad033be5c6329742667df8a79edca9c39d
-
Filesize
5KB
MD5b0e872479c1ae6942f93f49079344d38
SHA1c67e45472347c1350ba6bc95abb5a2c111a81b5a
SHA25625e4f82624178de21a69cb1584b23d31f36e7eebcafb88843708fe08d72fd5b2
SHA51296885b2328753ec59b9a9c8ed86ae1fe3197aff0fdcc7afeb1022ba09e6e150b315b9e04f43eaee8037a402f170fb43c4de9f65079ec240d6f77b79195f3f245
-
Filesize
171KB
MD57e2d59eeb36c97f0516a5b6c1776a24f
SHA12ac74a6e41c660b9724ebd78f536515713855ced
SHA256951a6493559a32dae2767e84541177bfc30bb8fe601c232dc96e8a728de02ce6
SHA512d6417616a83c5d7942dbe4fe01b9eef4618e647e180971b9bc9bac468c19305aa19631dbcc29fb1f6a0b58b04709334fbba3c4dd8125b623b69a192607769806
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd