Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 08:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://boutiquerecruiting.activehosted.com/proc.php?nl=102&c=469&m=656&s=a31b9a6bd276c6095af0cb541212dc75&act=unsub
Resource
win10v2004-20230831-en
General
-
Target
http://boutiquerecruiting.activehosted.com/proc.php?nl=102&c=469&m=656&s=a31b9a6bd276c6095af0cb541212dc75&act=unsub
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4576 chrome.exe 4576 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe Token: SeShutdownPrivilege 4576 chrome.exe Token: SeCreatePagefilePrivilege 4576 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1868 4576 chrome.exe 81 PID 4576 wrote to memory of 1868 4576 chrome.exe 81 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 2772 4576 chrome.exe 85 PID 4576 wrote to memory of 4132 4576 chrome.exe 86 PID 4576 wrote to memory of 4132 4576 chrome.exe 86 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 PID 4576 wrote to memory of 4012 4576 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://boutiquerecruiting.activehosted.com/proc.php?nl=102&c=469&m=656&s=a31b9a6bd276c6095af0cb541212dc75&act=unsub1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafef89758,0x7ffafef89768,0x7ffafef897782⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:22⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:82⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 --field-trial-handle=1936,i,1653314180659254935,8333796051761936366,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1632
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD520713f0f16cf0a5dcfdeade5f3a3e52d
SHA196c1614c89d4c334d8faa3411992709a5266d62a
SHA256dc106ca68a7397c7ccb660192101ee6e11bc0ae25ed2e145ed759584e6b08b92
SHA512671b936fc538e5a80dcac99d25f45e0903c851939aa892296a6f8ebf4ead44443f6cbf1cfec5beb7a4ccef08ac353ac8f8abef24fbac7bb2ddddbfc5e266f189
-
Filesize
1KB
MD57cac5171df231d11b3474605fbd829d2
SHA15e503894a4e0e072ac6c09e44360b9c2f665c68c
SHA2568b6891ad3361765f04461815083c4677f714af8f02bddaa112cf793c40b302cd
SHA512b7821452d643fb546018323e2a3cf487c95cd84549ed22e247874d23c8fc17e5f14267538a0fbf682028018afb6bec4407183ab1c1d4ca44666fbac12732f4e8
-
Filesize
2KB
MD593b073733cdbea97e7ad44f084411a42
SHA1f77834b67ed44ce7437186dab6671cb08db0684b
SHA256c48c516941b30b0b5a1391abcf26f4bac97579409d7e2419aa83551068a9bf71
SHA51235b72317e41ccac52dffb5313478d2b6600040acfc4340a744dc7c6fc0eb79a97cda00ecf4572e9858dfc5a48cee97b17c9f7d7339d76799d7eb22432c6cc86e
-
Filesize
872B
MD52372917c1dd92e3d7a99e898a71ac1f9
SHA185a0f345d2edcce5ed33aa2254aa292d00a4d9ec
SHA256029a707aba78cdc9345d0b7bf2027e0f777e3e4fe922a7227fe10794cd378238
SHA51278b9d1e13b727ca4f5040e62b0dc920a4ccb8966f998da6826b6185a9f8045e6536dfdcccb20c24f8b0e720b17362c5d497f53fe7893e520ca18af90a8e4ae8d
-
Filesize
872B
MD5fade06b8672f55b69b76321de3814fcf
SHA1c11aaa9fde9d5a2ca7391f578516e493906387c1
SHA2566720515cad03f3678c22cf7fcac3d96de20b372572d14ef21f229dccc8f10408
SHA5121480e07a5a2d95ebea4efa9c4f8f6c567ee003c51a4827c808f26c54517ed5fbfcf42ad82c87b96908ef60909794b91eb136ca0dc57b318860a7606e57f7e5a8
-
Filesize
5KB
MD55298058112520f1de81c467a2dc297f6
SHA1cd3e6dd498b94a6665af51639fd47ac960c36eff
SHA256cadf412e1b3f24f5efcd31fe16dd98cf8ab866d156e85fe15978b08bbeb138db
SHA5128141e2cc7108893c1233fc3d6f32ca19ecc91c392e89b509f8711661e1f0887693c13dfe859d3726145f5e3d693a48806cc6f08bcd3c47c03d392f5346137f1c
-
Filesize
5KB
MD5adb302cbf432913e128f24ebfa250560
SHA12ab28ebc2e069b58f3fc95cb699f8d889ba70adb
SHA256ac02e8e320493ecf6b236b653048296b19d7994b459fe99f45c0128260ae84b4
SHA5120dbb11c10d87fd5c3c7c42c14557cb6b6fb2a4e7f90d500390e8a7398dbce0c62254ff14b25670a62150e544a0a12014ee77b352bb04273e881c8c5ab3991e05
-
Filesize
6KB
MD508d56555856d1f34568308771e77462f
SHA12475f19b887993a1b60c8241a01b9e479449be6a
SHA256e0902d4898e0ee9161dfa665b08bc15e9fa375a0df72f435dffb7436c529fcb7
SHA51227edac3b80e1e61e55cf79ddcff66fffd259634aea6f30fcfc1df4d66c763e72a25b1d4f90994fe8d50331f5bb099e711e79b926a82d2a630ef905c332ce2289
-
Filesize
190KB
MD509e52ef5d175b7730373b975ce140a38
SHA1bccee7241e3fbf3e33425731f8fc2c1e6c4c54f9
SHA2562ad6b5e20634747e93979f7e1d1767c8322f6003ab8a2940d98726325bdfb849
SHA51256068353e0dd942aa556420f9bfaaabacde21fa16b60445f656b62fd4fe1c81ea35673e58457cb2d068e2a5728ee2fef496405e9d85a8cae15942c1fc3ab66a5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd