Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 09:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aka.ms/LearnAboutSenderIdentification
Resource
win10v2004-20230703-en
General
-
Target
https://aka.ms/LearnAboutSenderIdentification
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133370832503852149" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4912 2916 chrome.exe 55 PID 2916 wrote to memory of 4912 2916 chrome.exe 55 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1688 2916 chrome.exe 84 PID 2916 wrote to memory of 1380 2916 chrome.exe 86 PID 2916 wrote to memory of 1380 2916 chrome.exe 86 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85 PID 2916 wrote to memory of 2604 2916 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aka.ms/LearnAboutSenderIdentification1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff866e39758,0x7ff866e39768,0x7ff866e397782⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:22⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3436 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4972 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4540 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4600 --field-trial-handle=1876,i,4201123731742571995,5833741867723829244,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1808
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD5e9a1c154595f7291f2f7211fc66cd607
SHA17bc0d21d7caa0f77835e25091caa2e95c3172472
SHA2563f03f58e9b2db497355fd7bbbdcefd34928a377ee8359cfc860c0cd14d3979a3
SHA51223a866422a63965182c0f9ce5bf61a3820c345dca383207d55c9a12ecff8f2cccd1b71f8047a80a975e7f455526614d9e668f5cffbe4efb9e36bc35b3a5127d1
-
Filesize
1KB
MD5b65650409cb54967c59565651203e5a5
SHA1ec1d1b7bc7a2095ff27f2253d46a86bd633f2ab8
SHA2568eb890e53097cb7c800dadffe34f050ed6ead7d55cebf02bea338eab3b961cef
SHA512e02adbb964f7d3817dc08973e87ceb1c401287b5da741f710a3aa48157fb430553f79f2517b830a8a87a74b25d0886a47b699f04d138f2e690dafc5882621fe4
-
Filesize
1KB
MD50086580eeb8036dab73c926b07ec690e
SHA19541790ad87277deb634cd78c17c885dabedf752
SHA25615d527610dd7f12c23cdf2cec1067a9748c8f25c25b84469b2b41248dd17324c
SHA512e10a05494955ebed713f4d34453de6b5f39bad5ce4130b1bd694da1fc26d7973808c92848404dc23362cfa3a0af85124d4bd0606fd96e6a349d67e110c21a2b0
-
Filesize
1KB
MD58e7709e06b396a158bfffc7dff804781
SHA1320db7eb3d2b0333b4f209a56a0abafb53ecec7a
SHA2569645d385b53496ba97df4a8742fde6db546608afd3837421dbaeb62f36e7bd53
SHA512d7038a39b404a020c671b9503b3f1d2991a88c1d77db2c527fc294c8f58f90d13756359c07e580dd7c1c952cd354fddb1da0e84179ea3ea19a707423e5570dc8
-
Filesize
6KB
MD5ef50b6cd7acd112950fe58ac2253472e
SHA1a35cbfd729c7f40b54db3178ebc065a01cd1e799
SHA2564d6cf78099112871262712314baec1e9d41479642ef8cf70e8fe7c367c1d574e
SHA51203f5484f16e6f10c77ef5d37c368138a9beed41ec14a369e58a92a8dcacc053a47e732c3da6afdb2b0f07b419ba4f1b4a14b4451e138504b37343ee4870d0f72
-
Filesize
6KB
MD5a227a60e84731928a7ab0aa66af77da0
SHA118f798669b7aeba6e7e052a5327191cb4431a3cf
SHA256a9c1f79b28f8267034e8c01a34d201f0cea1f46bc16e141ed0625dec6aa14c0a
SHA5126cc9dc5d54d0441fbaefbf437025f8d5716dbf3a993c2548e9a4c121898557d34122c30bb98a37d8f8147b30f178ed1d4c19ed6b9a6b1869027b7a1932853791
-
Filesize
6KB
MD5d6dd122b2bd41b08ee19a0e0a19a1cad
SHA13705118532dda2c9d4a3f5ce126d92fa74499fb5
SHA2565f68c82ed30a14251aede5c3fce0bd7850b831586f4fa77f6af6a61060dca2e4
SHA5128d3c5d9fd0ebe314d432d0bcb945d816cd9c6eca2506a4d3cca41df1f845bcf2dbf32fc387a493addf20c8f5104385d227ee002c86493ac329db503b18fc07ff
-
Filesize
6KB
MD5e3f51f3c28e478ad7a76fcff8ec2b10d
SHA1be82912ef22c04ded3913cbad01e77bc658af624
SHA256c7a4eb1adae897194030928ee60d3c9e6db81a94879b4b5cc6c44363b9fa6c68
SHA512b495d1d296a1975e310b2daa54a25543fcf9d6c25f8dbffa0180d0ab70f381aa82214d85b0ab596554bc6a369b264f08db64b9ced1e355e60648e32379ef7a86
-
Filesize
87KB
MD58a1c9a5234b2d29c09a8736d59a58486
SHA12b27f5b7723f36e47a9717b2eaec3cbce69c32e8
SHA2560ff007be0f36db917c21634e42bc21b8f587ed7cfd383accac0253ab701450ab
SHA512dc4adad31912045b0ca71b9147d33576752f493abca7b2101d466eee7b2aeaa44ef5f0e6bd183cb1df6877aedabff0b382747728a9258d280c920055432d6876
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd