Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 04:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://evolenthealth.storage.office.com/OUTLOOK/Evolenthealth
Resource
win10v2004-20230915-en
General
-
Target
https://evolenthealth.storage.office.com/OUTLOOK/Evolenthealth
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410386023204759" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 560 chrome.exe 560 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe Token: SeShutdownPrivilege 560 chrome.exe Token: SeCreatePagefilePrivilege 560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe 560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 560 wrote to memory of 64 560 chrome.exe 41 PID 560 wrote to memory of 64 560 chrome.exe 41 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 492 560 chrome.exe 87 PID 560 wrote to memory of 4624 560 chrome.exe 88 PID 560 wrote to memory of 4624 560 chrome.exe 88 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89 PID 560 wrote to memory of 3572 560 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://evolenthealth.storage.office.com/OUTLOOK/Evolenthealth1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3029758,0x7ffbd3029768,0x7ffbd30297782⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:22⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3960 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3524 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5080 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2248 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3844 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1908,i,9972125942481758649,2105729089023410073,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50f9f7193c69dc8d72241b2a46fb2c284
SHA1553d2d677ebf189e667f76a49af759fcf3fcaa1c
SHA2567e8c61b62daabb71beb874a4a291f2b43d97fcc10064b15d4867033e60817dd6
SHA5129092a64eb82d80080c1127a5cc9d4ef8a432f5d9c52131e7207ec95e51513aa84012fa60d37a2703c62ba6fb2cc60a0f0ba8c55747bb682b5c25f9f6a2d38b3e
-
Filesize
6KB
MD588ba811a01c08690171cd45f0d740c32
SHA138669c27aad3019eb2b56b79b654301b9688250d
SHA2569507ee007dcbd6cf46067f112f0d34174b8e70875cc0bd7b6fd3ecb0b5395cfd
SHA5121c19c14110b39a2b0baf7a1a41c3b0415c30a82b9ca94fefab1b3ed81e237a2480b16d55a15e2d38a2ba3cb78345e4ed3421361305ec78fe4483d700d33d3594
-
Filesize
6KB
MD51099c851649b388455bf028bea45c25f
SHA162e727e822d3a98a19229f032c6fe0769ceed86d
SHA256d1e8f8cbc3888aee66f139e7897c1541014e0025206bb4cd34bd3a793c4a40e3
SHA5128df0325f3b0fcb4c271cdb93ffac55be58bc760af3c03a4ccf173c106948c053590939e523b366560dd1d79a880d14dd4e8c9b4114fdf0ecd4e1cf43757fd5f3
-
Filesize
101KB
MD5148ad56eb66b48f1e98f29885f9acf42
SHA11ccf60a844bcfeb0a92d20792c519e67c938c3fd
SHA256bd80fcc14f24627c1567be6b40069627da32458b40bd0b3b15b4ad8a4ef80261
SHA51219181ad23fa73b51cbe7c7f5acf753798ad46881902b4b2a3a3b826bbfc699c62e4ea5571fb9ea9fb5bf0c2d1989ad955a7c744e650a032433207dfb9d2b88ef
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd