Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 15:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://verkada.com/emailsettings
Resource
win10v2004-20230703-en
General
-
Target
https://verkada.com/emailsettings
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133365873756752247" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2360 2980 chrome.exe 78 PID 2980 wrote to memory of 2360 2980 chrome.exe 78 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4056 2980 chrome.exe 83 PID 2980 wrote to memory of 4560 2980 chrome.exe 84 PID 2980 wrote to memory of 4560 2980 chrome.exe 84 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85 PID 2980 wrote to memory of 1508 2980 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://verkada.com/emailsettings1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff8ef909758,0x7ff8ef909768,0x7ff8ef9097782⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:22⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1244 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4896 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2404 --field-trial-handle=1900,i,14058263383570862013,14712647585118839855,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4516
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD54d6e9b0803020da5c2a16d5c347fcfec
SHA17446c0da7f3bc68615e263ecf4227f6c6914ce00
SHA2564968d48239f8cd24af37bf08cbde59b54e82a8e1d27b851b5bed3e8352b82655
SHA5125df8ed71bebd708f98ad6d1702eb451998749992b737c3985e07c620a91f3d65bf1262e6adc3e7c84d6f62baa9fa61c33516efd8744373167159d3877c9416e5
-
Filesize
5KB
MD5517f9300945a81681d836cd193b4c38a
SHA1ac36ce29f17761cd8b9f1f9b715775c6a9449527
SHA256af3a4f7424fe825a0f9fcc5480a3ba4ce8da803b13871e60e39c85e65a1134d3
SHA512e1985322aa905902b178ff7fabc5dcbbf43a336de8586b5bef6813772a080acc2fa92cfe5a7e048ff4733ad427fa58aeaef3beb103ee36ea76e3ff89a6e41292
-
Filesize
2KB
MD54d4c74b2c56110047a5269265c2763f4
SHA1cfc3e3cb44f7dfed3ed4248f8c5a1d6e50cfa7ca
SHA256c32a185efc39368a682b446ae48e900e0b34db3ec5e475e7482dec4f1065a9c3
SHA512e1c48dd2c100f7df94fd5550b488819ef01459bc674ab0749ffbe49eeb3999e515758504dc10755935a825bfb241ae3027c56e818457ba0c78255e32dedc7468
-
Filesize
2KB
MD557a95fe236a808432ee9a59e36f0cd63
SHA17a3ae08d924c4ea8ff740e8413f26b5697a4ec94
SHA25647415a1fbd4c68fe9dc9525c6a6e841bc7a9e19647b52cf2c6620f2cf4043eb6
SHA51233e06fa594694c9d992d0ea58c0e9222d3547cc502ea34febaefe0e1f3add40eb111428f28adfb88e219d8e921a870641288aa0a3285c896f74abccf4675f836
-
Filesize
6KB
MD590e97bcfb761897d3a6a627a8ceb89c8
SHA13e8bc5769326e5d7a64e7962b327aff731f6d08d
SHA25613b3e0ca9254ca48fab92a397c3bcbe4e73fd6613c50bb33348ae629801d4f77
SHA512ab445283d38577eb89070dd350ec8ced710212f405b0825354b8023e752d63678099b3c7f1c2ae1e270ff6e45c321c6fa07d81f49e894931489c681dda665cd6
-
Filesize
89KB
MD50f14f5e1ff844452f453d6898e10d817
SHA164a121a02fb5445d082b22a53ce53d2c395ea13e
SHA256a79baf0bf952636fcddd39d2a97ab76f7a2e510aaee8320fbdc781f440ad67f5
SHA512884bc608b1d05e1ce2e32615383865227f6b87af533c5e23bde298b78eab79394d974a1420d4062d8340a40c5fe446b3e10428fad743360afeebece6e6e5be5f
-
Filesize
89KB
MD56784236117cc699503e97d5a3a3fb02c
SHA1d739271641460b4d09b0a85983bbb9049f5d27a4
SHA256fd6fcfc4a8c4eaef329c325f4618806560dd571be64cf39f59e5042ff0cc70b1
SHA512dd565a796ecdaa454e4d73a8502fe45b499412b262629877c71299a1afd76471c7de4a3c632ea01529191422055fd7b40bef869b3418681030aebd2d1bc936d1
-
Filesize
89KB
MD538adc039bb97ba5413d0ca7f7ac63ea8
SHA19557123c7bbbfccdf76c3af04a90d14bf8f7bd76
SHA2569f7234445097202d0183440b06544aeb500fdbd74298947789766f338dbb9754
SHA512d5f244d4996f93889e1962a9ec5795c2f9df1c36187330714a319b1d55442a13e12e7c7f85da2051aeb6dc1bd89f12fcb6200df44f168a76bc07552f340d39be
-
Filesize
108KB
MD5e2ff550f08ba5858447f554846dac86b
SHA109d70ae78ed4f67abc731ae3dc55ec06b1d593e5
SHA2567b88743df0713e851afbd11ff75aabae46a359a84006bd785f2ad4d65a06a87a
SHA512ee8cdd3f6c6551226a077a9ad0fad25f2b41dc5832049c178946c93413e80cd28fad1f44ffd33aab1101d4a42cf4e1661187845fbd061636cf7cda1350998aeb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd