Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 06:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://indd.adobe.com/view/8f0c0fae-294e-4576-a9e7-93671166deb5
Resource
win10v2004-20230703-en
General
-
Target
https://indd.adobe.com/view/8f0c0fae-294e-4576-a9e7-93671166deb5
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378518267117706" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4984 2672 chrome.exe 82 PID 2672 wrote to memory of 4984 2672 chrome.exe 82 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4948 2672 chrome.exe 84 PID 2672 wrote to memory of 4676 2672 chrome.exe 88 PID 2672 wrote to memory of 4676 2672 chrome.exe 88 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85 PID 2672 wrote to memory of 1348 2672 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://indd.adobe.com/view/8f0c0fae-294e-4576-a9e7-93671166deb51⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d6899758,0x7ff8d6899768,0x7ff8d68997782⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:22⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:82⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5052 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 --field-trial-handle=1888,i,16957969954854144055,12922518505296833988,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3944
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5de2a3c852388ae32625996ea36155adf
SHA1f6f47408f0c20ab82626d2a5df59b509e1bb8824
SHA2566e757e0e696c014a057d2b742c51a7193a84310ecf22d3163adaf91d5b66c277
SHA512f8e0370ab67e59bacc06060f3d3af159970e4927f4cae98509b32bd08515a448c0fc19cef1b7c6b6c2ad35581fd31accbb3fa2d8551cf7c1b065f0f1b6ad8f6c
-
Filesize
1KB
MD525286408eeb09c57128d707bd409e777
SHA1a54a86b09796e0aeaef227843ca91227e2d14c72
SHA25600bb798f21058dd95a08e7bbdeb3f3b41b1b79a72c80d4c656f27e45223c1277
SHA512e0e4131d8cdbf33a38aa4152f8e0604efbc79deba81e0907c55b0282d476e23974f0616b2b3b707c7c53964207cfa9fdb2a8f6b4df52a866f14e11be7b4475ef
-
Filesize
1KB
MD562408a46de153b8568211580da2b3b8c
SHA1aceacacd376a92332bf2646399fe0f76b1ab2d6e
SHA256d948ed1e6eb5dcfab48f98d971ccc49c4c0853a9da333cc854691aca1c9550c2
SHA51299c561032945b056a0aac91c1eeb340cc997ff8476405d520ab58bc64cce239fbdfe55c8146cecf39a489bd43327777d3cd0282ba6d6a68fa2e92511e83dcb89
-
Filesize
1KB
MD53fa72ca22284d58e8fab89d9e241293a
SHA11823389ce1b482f440167ce4d3effcc83252a2ad
SHA256587e2a20b94c58fe4d758f897758950b28c7e96e507976a855fae51b8a202284
SHA51255b9f09b5368112e6cf72790da16cf10fdd4feee9e7bf5cd22a19d0f526af05b57d2723d5162dd51ceb834ecda37b371084f2f68276c9b27ffe23b8a6433fa17
-
Filesize
6KB
MD518edf6f8fc302256b605b52365bb03e3
SHA1126b6a35c9e7ea60fce5689ef65a6f7abbf167e4
SHA256b246ac4f80ef2cac1bd4da73b15f3fdf0336453137cd196fceb8bfd2cad91a5a
SHA5122f33ae263115bca4a41d644c85d67b05b1bff2abc15e794ed88326b26c39cd83367bb6253f59f725e309e13b2894431bb5c97efdb3bcf2b5cd691502707378f9
-
Filesize
6KB
MD5789cfccdadd0ae24890d58bf78255361
SHA18685df99f09d952ed54a7052b5701919b76ea8fd
SHA25605919ba321b86bf7170164a1254fe1255d8a461e6560c5c77104c71bd58803a4
SHA512047d64506dd122610600bd87620819b70bed29dea5ed6e4374145dcc3affb5539ef042bccb9e5112f0a7659c579a8b991f7ead07074e44ff6ae81f191ffbb4d3
-
Filesize
6KB
MD57689596472badef47737ab364092cdfb
SHA1cbb1b652da262f516b43228871d542427ef6ba3a
SHA2565c3a88b4cc3da411e3dafe0be80588230b42d932b444b987de0f1eb270d9fc3b
SHA5122826aa2562769a8cf134d36fd3979148c2a30f1a41853928e6f1c52d01b059c46a2c44ff3e6d4160580bd6e9d2274c7935eceb81ae370fbd6d3fb0cbbf2194e1
-
Filesize
87KB
MD5f64c15da380d250e2270b3ff85718f94
SHA1fd375671cdce8155c6cc49a4894a6e8e30eeb4ba
SHA2569608300fca1651fd0388173c1e1278ad7ffc2b9ddb8b908651f2a739915db61e
SHA5125977878f4aa0f63ba91f5634af2c1f8fc582c1e836b01e1c1518195867d56691a8215341c9b5ad8d52e5aca828bb4d5d95285fee7249c5466b92713356cc0dcd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd