Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.wpp.com/WPP/About/
Resource
win10v2004-20230703-en
General
-
Target
http://www.wpp.com/WPP/About/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133373629712735087" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3892 4708 chrome.exe 81 PID 4708 wrote to memory of 3892 4708 chrome.exe 81 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 220 4708 chrome.exe 84 PID 4708 wrote to memory of 3092 4708 chrome.exe 83 PID 4708 wrote to memory of 3092 4708 chrome.exe 83 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85 PID 4708 wrote to memory of 1176 4708 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.wpp.com/WPP/About/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44299758,0x7ffb44299768,0x7ffb442997782⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4728 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3140 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1988,i,4182691357249675268,14235217024462789960,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4444
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\876cd87a-47aa-49c7-9aeb-e032a0a5ce83.tmp
Filesize6KB
MD5fef9e7da39e0bc73a74588eae5e96e80
SHA1ee4042d100a1fca54c7274fde068633454f355a7
SHA25662941053e233c2b6c1dfb2443f9c39579514ee53f2bfa271db48cae36d897458
SHA512ef7a3463eff4d38b5d7c93b4794d032e020eb47591ea8e095b5b893d2a8a6b28ffd0eb60e16af7c19aba4855b3b90511b363e24473400afe4fcc0a3c44323e26
-
Filesize
528B
MD5b42a90bb3968a0114b9eba03209078b5
SHA1be0d0b1be4430b1587777845c28a860a52b1961f
SHA25624058db4767803246b203b57be66314272437c3d2c53982852dfacf244b3d88b
SHA5123ef3010defb65d0eed005b93bcce5d41cb59de74b5aecc06020aba1b847bf087616fc432f80daf9eec1e280cf99b592d2cf335401d33faf5b62ecf1219d11345
-
Filesize
2KB
MD518710314e34efce6f72417869752c67c
SHA179ba9f945b605e53ec29bcf41da7166ebcd60ecb
SHA256e0395602832cf4f397bf91b9b2cd5f712aae63f5d3589605c983502cee2c4ca7
SHA5125f0893ff38ddb8251ec5fcfd7bf8d2f64da44ac372128f27323ffd8e5db1f9f5eb8279393f866228d07db103f74a2501c5837c6e6a2631b288e97268fc8ea9f9
-
Filesize
1KB
MD5c53dc270a421323219d2ebab4f025893
SHA1d6ef1462bf8ac94ec2744a67495249df35b41052
SHA2561f65034c349c2d36a6b1358233b9b2e3be92294df4d800d5e89e6230b9b6617f
SHA5129084aabb6b711a85b99b3f1d14628c9514074ad87a9970608f812368626653267a45ecda86a4589321d0180cadc447ab41cb542d33907dc636e130d46fba9d97
-
Filesize
87KB
MD5dbcf8d8316e3f91688a232ba7ecae1ff
SHA127a719bb9563cb86568108a107b69a8f2d098406
SHA25684e0e8e19b68c55043490b620a05fbe0850b601c167331f371b79b7f55025ad9
SHA5126a5fc2955cfec699958f5c49ad04ac853e96eca8abdba3c37e89700e4f88afa764180e69f536d023716bb76ad0f8e20bdac9f201c3a73d8178dc6bb9c6cbe01b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd