Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 05:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://colemanresearch.orbianca.com/api/mailings/opened/PMRGSZBCHI2DMNRSGUYCYITPOJTSEORCMVRGCNJQGU3GILJTMVRDSLJUHE4DKLJYG44GELJRHBRGMNZYGA2DONBXMERCYITWMVZHG2LPNYRDUIRUEIWCE43JM4RDUIRTO5QW2QTLJ43FSRKSJNTWCZTGKJSXCWT2LBVUWT2FKNLXO2C7IFSFMNTJJFUG2QTON5KT2IT5.gif
Resource
win10v2004-20230915-en
General
-
Target
https://colemanresearch.orbianca.com/api/mailings/opened/PMRGSZBCHI2DMNRSGUYCYITPOJTSEORCMVRGCNJQGU3GILJTMVRDSLJUHE4DKLJYG44GELJRHBRGMNZYGA2DONBXMERCYITWMVZHG2LPNYRDUIRUEIWCE43JM4RDUIRTO5QW2QTLJ43FSRKSJNTWCZTGKJSXCWT2LBVUWT2FKNLXO2C7IFSFMNTJJFUG2QTON5KT2IT5.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133412153644571041" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4444 3596 chrome.exe 83 PID 3596 wrote to memory of 4444 3596 chrome.exe 83 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 2736 3596 chrome.exe 85 PID 3596 wrote to memory of 4248 3596 chrome.exe 86 PID 3596 wrote to memory of 4248 3596 chrome.exe 86 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87 PID 3596 wrote to memory of 1848 3596 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://colemanresearch.orbianca.com/api/mailings/opened/PMRGSZBCHI2DMNRSGUYCYITPOJTSEORCMVRGCNJQGU3GILJTMVRDSLJUHE4DKLJYG44GELJRHBRGMNZYGA2DONBXMERCYITWMVZHG2LPNYRDUIRUEIWCE43JM4RDUIRTO5QW2QTLJ43FSRKSJNTWCZTGKJSXCWT2LBVUWT2FKNLXO2C7IFSFMNTJJFUG2QTON5KT2IT5.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8edd9758,0x7ffd8edd9768,0x7ffd8edd97782⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:22⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1888,i,2183593363009732899,16096292917828527535,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD5a074f835e08fc8e74dc1fff9f287f09c
SHA1025bdd1fa933fbee2f43b56ffa5583de8629d945
SHA2560034b5925d95c18f11263b18dfb5ed12851e70a1d643cee74d4af45410f8ef33
SHA512ae8121097bf098fb01ce4c7c44137bf6233c6e95ab94cc5da3657d59cdac939b9d1737c97054f287b1367159fba90741348b2c435ab887b3809b67554d79a97a
-
Filesize
538B
MD51fcf2e4454c53171d7417b7b1c908f18
SHA1b2ca6c16b5435b96767e6e996ebca3dba6611820
SHA2569ae7541817e6c883d4141e782ddf71838a52e326b026b45458739d01a903f8b3
SHA51262dfcdfb63ddfc76b3eda96be04c526d6a7a1fadac21aaf063b838b6f7c34af42dd78665c4f2d047e9dd45e125e6513a714014576fed85327ce8270aeafec1ed
-
Filesize
5KB
MD51f3ab9d05c2f87f55d77db6a7460c6db
SHA1dcb63982f0bbde749edab188c0e59735cd5e51c3
SHA256d87209ab2378bb9bd794f30ecfbf775e1d68db79b54257f5d952b6a5bfa84df7
SHA512782848c2296df4cbb9c7a724844aa98815b2fc66b6fc49441e326bac09c7023c7feacc4a88d56edaec0f64e1d2654ae2933d53a348de19154d8fe124516156b2
-
Filesize
104KB
MD5a5f0adb4b4b63a78d89a0f75d34a4e79
SHA165746d1aecfdc7c84034e13b0b8cdaea817fa0fa
SHA25654a5787f8194719ee2178d34a1bf6af27b4fc613622e17b7cfd292e36df655b7
SHA51253f2a08b6d3b5b5b1e6b05ad721e2a91e49354c47cd710faa42b91dfe312d251c1f1396d27ddfff685892928c6a7282af7f165071cd5b444b32206707d937505
-
Filesize
103KB
MD5b7049295c274db13b3e2bd3720dd4d21
SHA1026ce065305f76cac0cfbcece3bc9129dbc6ee9c
SHA2568d52193e7fe4fb89f18bb97575001d8f4d631140066eef2eb986b6c76a349e99
SHA51234c886874884f2530958e994719eb5fc31253b2745ecc3e38c9eeec2f4de0b4f0934d4427040d621bcae6d6f295efb8384b90d2073ee8f0a8f3b1bf9ba1d7f88
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd