Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 20:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://online.ipsosinteractive.com/surveys/?pid=S23034439&idtype=real&LPCookieConsent=true&id=195
Resource
win10v2004-20230915-en
General
-
Target
https://online.ipsosinteractive.com/surveys/?pid=S23034439&idtype=real&LPCookieConsent=true&id=195
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410100040876363" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 2544 3300 chrome.exe 50 PID 3300 wrote to memory of 2544 3300 chrome.exe 50 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 1684 3300 chrome.exe 87 PID 3300 wrote to memory of 4092 3300 chrome.exe 88 PID 3300 wrote to memory of 4092 3300 chrome.exe 88 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89 PID 3300 wrote to memory of 4140 3300 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://online.ipsosinteractive.com/surveys/?pid=S23034439&idtype=real&LPCookieConsent=true&id=1951⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cb219758,0x7ff9cb219768,0x7ff9cb2197782⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:22⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1680,i,9978252988786398867,15552603055794351618,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD561ab2d10aa171eb9b47369eac296a91f
SHA1ba25a4946adee34581efa80d96c2aca1782104d6
SHA256ed949d9e36befba168328b6340938f7cb117eb0932fd02c0a6eb8eca3b071890
SHA512e2289abc615ab90ff8e5c354d2b7939e01e205fbf953ac2613b89186e1520f7e1cc8fe5d99e2cd31bcb0b21bf68776d7a287d76e5cfde4daf8deaf3370f7925b
-
Filesize
1KB
MD5d21c3f2df9478b70cfe42a384a5f92a4
SHA1aad4d3a43a488cf50b60580607bd1c4b2dd8914b
SHA256d26e8f02771dacdc9735f51018df636b42f76d66f347520435956162a610aeb4
SHA512a08267836a193ab71c2bb5a1d04b66d2428c01a92765e578bebbb3d359b8cea20422b2cefa129e1db3eb5a3edc0f03feb7b14b2ceaae0e7f52ad4e183502f058
-
Filesize
705B
MD524ca4f6820857a33ae2b89de8310a798
SHA1c686881fe71691405db5e10dd1c4a72680234ac3
SHA256e6df028b47c9da2cfa412f5b537efd021b1abf6876f0370f23d44dd7433fd25e
SHA5127db497b1dd9bb97187d18df28346d207783141bd360aa0fa5dbe3e3b64108cc71ef08cf048897a21a26cf6291bbdb81d8cc8ac5fa34aacdd05a53a87a310d6b0
-
Filesize
6KB
MD59ced924c2182a6e9b171613c465d68d5
SHA1b29178315d2dc0698c2edaf0e22ef39033206ce3
SHA256ae7f6034e928a2b54214ac594059506845ab0813b87d34758fdd0690aba4639d
SHA512518278a32535edc16929fc487b01a6d2c6a5b73e3e3af090b7ceedf5ab2b2b005d096f60f8b33fe795c072e24d8df3a8fd08b514e9ed6ea60908a9bbdfa12865
-
Filesize
6KB
MD519e69361fc6599749b61d7426cd4ecbc
SHA113feb6ff34084af799034b0fc7116c70ab94e152
SHA25666f6c521a35312b78fc1d8aea3de730d8b9a3b591d1473a8e93079f337fa699e
SHA512471faa483e24a4bb9c40a7052a1d2707132996ac1a6bac4f0321d8bd18e5057eb87d5a81593fb37a3e5f3f9bcb919cd715d61ee65ce3058154bbc06656fa296f
-
Filesize
101KB
MD57f93cb08265408328bdc408dfd412b81
SHA169f3bd0e85b9bbeac09d268626a6e2149590f8c2
SHA25681aafb20e1671124a4bd63319d0a578b1834ed5f2f8f532d2b525bce48cff986
SHA512f5b7a5f6dfb8ba6664a91b4518e4dbbd1afe8ef4df14d5ecb055f3953ab181a08e13c8df0dbe1b959d237378765fcfdcce6df5b895847ff04e313a52dbc77d48
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd