Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 18:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mail.carlisle.richmond.sch.uk/XHTGCQoQGoVg9PmPl8p7.qe6kwrm?2g0-gAAAAABlFxC_tPKLh95vlvJoXhokvmQXllmXKplMzw6VBfgrRdX1HAxA6d3bGJFIOl6RvL2TcAKkhDfbrxtrW-8S6mmB4iLN-8FGWtbVn1pHvu-B0Y12lA3LHe8qj0I3vJ1uXM0PBEcqdevnsMKjvkfhlnGo6wchcQ==
Resource
win10v2004-20230915-en
General
-
Target
http://mail.carlisle.richmond.sch.uk/XHTGCQoQGoVg9PmPl8p7.qe6kwrm?2g0-gAAAAABlFxC_tPKLh95vlvJoXhokvmQXllmXKplMzw6VBfgrRdX1HAxA6d3bGJFIOl6RvL2TcAKkhDfbrxtrW-8S6mmB4iLN-8FGWtbVn1pHvu-B0Y12lA3LHe8qj0I3vJ1uXM0PBEcqdevnsMKjvkfhlnGo6wchcQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133404870105603635" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3700 3044 chrome.exe 59 PID 3044 wrote to memory of 3700 3044 chrome.exe 59 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 4944 3044 chrome.exe 86 PID 3044 wrote to memory of 3740 3044 chrome.exe 87 PID 3044 wrote to memory of 3740 3044 chrome.exe 87 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88 PID 3044 wrote to memory of 3792 3044 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mail.carlisle.richmond.sch.uk/XHTGCQoQGoVg9PmPl8p7.qe6kwrm?2g0-gAAAAABlFxC_tPKLh95vlvJoXhokvmQXllmXKplMzw6VBfgrRdX1HAxA6d3bGJFIOl6RvL2TcAKkhDfbrxtrW-8S6mmB4iLN-8FGWtbVn1pHvu-B0Y12lA3LHe8qj0I3vJ1uXM0PBEcqdevnsMKjvkfhlnGo6wchcQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe461c9758,0x7ffe461c9768,0x7ffe461c97782⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:22⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3488 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4612 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=824 --field-trial-handle=1868,i,8438793026430414962,7092979042071726180,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD590f85909e5c932053cc70065f9850ba8
SHA185391d9f84cb11323b205b581d7cf2893c1b2e14
SHA25656b83e49b08bb8dd102096b72fda43215b94e231c1f104169e6585fe8e3228ed
SHA5120af7de562cae20234b435d8f9e056d123841217dd6b84a51d41535702adafeeba237432efdf031133f96ac1a8fc59e97f02d6b32c9f73de202dcd51730cd816d
-
Filesize
6KB
MD5684f62521647fb88ffd07095d3f772fc
SHA10406334e8d885c2c1d2d8d96e029e0ff6951c413
SHA2560a3f8684b2217d9f0da9743ea769719e56e71ea7ee74cf863eea6721b0173e06
SHA512bc9c320004f46503d9041a1ab1cc98a41489065a5723660e8cad8b49f2ee4904543680681445de7d913f71f5d80e923b75594042473b1a9c525c9892ce17feb0
-
Filesize
101KB
MD598f5137b13b6570978f20cafce85e612
SHA18d6d1fd97ea0e181c72dbf3fdf70d40c0af15fff
SHA2567524528981fbb0b3a8d9b95f689c7bd6363a9c317c36a882d8b617d4fa549537
SHA5129696186545c92144ce3bf26f2d3569ba241fa990f91ae4389ba243908f7493a7484b545d1217a82cf76dea2109344d6b7ebe83480b5157cdaa0babd285e0d62c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd