Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 05:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.mercurygate.com/e/55572/stainability-utm-content-ebook/mzr3kj/1495352373?h=9dWW-idXJ2GjgQTPQX3crCFIDQULIeMxpzRHSzn35ao
Resource
win10v2004-20230915-en
General
-
Target
https://go.mercurygate.com/e/55572/stainability-utm-content-ebook/mzr3kj/1495352373?h=9dWW-idXJ2GjgQTPQX3crCFIDQULIeMxpzRHSzn35ao
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413889087445644" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2924 3012 chrome.exe 24 PID 3012 wrote to memory of 2924 3012 chrome.exe 24 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1920 3012 chrome.exe 88 PID 3012 wrote to memory of 1484 3012 chrome.exe 90 PID 3012 wrote to memory of 1484 3012 chrome.exe 90 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89 PID 3012 wrote to memory of 844 3012 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.mercurygate.com/e/55572/stainability-utm-content-ebook/mzr3kj/1495352373?h=9dWW-idXJ2GjgQTPQX3crCFIDQULIeMxpzRHSzn35ao1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f49758,0x7ffb55f49768,0x7ffb55f497782⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:22⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5012 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5304 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:82⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1884,i,17932158893474832289,13230368616641071028,131072 /prefetch:82⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5277affc4cc2ffa99d0891ef85121f058
SHA182867081f6d26a72117675b2935ff76fa201516e
SHA256ce87d3e940f4d74992290717345599d4966cf9ffd0ec9315ca24651fb86ba15a
SHA512d4a90f225a6182a0d41b49e13e653b857c8471e156b0b0bf2d489af1c4cea89d6a278e2d280d7bf17effebb5ffb8193017637ab0af0d093094ab780e5bed9ff4
-
Filesize
6KB
MD56358cda19d943243c9ffbdd705d1af92
SHA1b3f657e58be6d8de3527de5d4d50de77ba572445
SHA256274ee554a77381c794f18f75078b079947fe823ac3ae786d8448369130e56b15
SHA5122671c9fd3a42988ac9377459e85a02cf95649686e529c3b8af94c9d6ca5647aa9a8a12bc4ad96255cda892425164466fffac6bf5f7d464e259b8821b712fb24f
-
Filesize
101KB
MD5ac724c331b0b7b23a9d0fe4c8e48ebe8
SHA183b50c7a516c2e84e7c8acfea5e3ef2b979ae374
SHA256b7cc82618d7ca52d3005115d7cf8b079fc2cbf6cf456fa30d18411c14d9eb84e
SHA512c235a3019057eedc7fbcd2df7f0d17455ec296e71255ec947c047d878cc560e62470915c8a8c8e128b28e77a17009fce30481254687769833f33e631a9f84c8b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd