Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 17:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lkg07-mediamanager.verizonwireless.com
Resource
win10v2004-20230703-en
General
-
Target
https://lkg07-mediamanager.verizonwireless.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366802456818637" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3776 chrome.exe 3776 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3776 chrome.exe 3776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe Token: SeShutdownPrivilege 3776 chrome.exe Token: SeCreatePagefilePrivilege 3776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe 3776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4268 3776 chrome.exe 83 PID 3776 wrote to memory of 4268 3776 chrome.exe 83 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 2420 3776 chrome.exe 86 PID 3776 wrote to memory of 3188 3776 chrome.exe 87 PID 3776 wrote to memory of 3188 3776 chrome.exe 87 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88 PID 3776 wrote to memory of 3192 3776 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lkg07-mediamanager.verizonwireless.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeaf529758,0x7ffeaf529768,0x7ffeaf5297782⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:22⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1868,i,17986323650581628816,17439377979227976390,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
918B
MD541125fe2a8004a987d85c362e6ab9811
SHA1e56a142ca466d304a50dff07fd59099616d173e7
SHA256dad2f726f16a922abce89f0ed17876684915d9e85e4c3d51c0b02b124b83a167
SHA512b8560882af6abdec684bbde635be5c79830ad17016399d2b24e48398b3e04501b2efd4fb193d5294b69352e09d153b3c7f65c23926970dc9bc56e198a067266d
-
Filesize
538B
MD5a53f4207e2b0fa94e4471c64ef3ce952
SHA137df02d224dc35a84df56ea7fad2df6c426000e0
SHA256117840cc1eb5054e991e3ad5f4f8f8fd5f059ee95e733f76a8e6d34ebbaf509c
SHA512e5971889b5ce8a1f9c867e37a5bba26dcd3a943fb51cdf04d2c61f08d1c8393a4a12a2255d715199a1a77966ef20f0059f88bc5fff5261ab48729d95bb0b89cb
-
Filesize
6KB
MD591e41e7a9aab29f9c64ddd6771506a0f
SHA17a1777473a9368583276251d015ce5343f945572
SHA2569be927d7af0fde7425260cb39f15b493661f15d9199b43341644df960a027007
SHA512ab70a238ede2289dc9731e70436f499b702eb91892e3544a5a5c1350ef0f4f56666c270062d0af57c541997d855df627359494117f506cdc2fe27d803074df6a
-
Filesize
87KB
MD526d24f8f341733bfc1a085a262e18f3b
SHA140ce57f132db37cbf7ea1a7aa6374171548ad010
SHA256dd2bdeabe76d72a78a1d8f058e7a19d6bc82695e968959d770acf1b18b722472
SHA512f44a8027bdb5d106f514c291f920729a9473a4512ccc7fc0d7f997be93969b52ff006b8eb7f658b31e3fe59c0d8b5fc251b4130144264a61dc4c860e727fbb15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd