Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 08:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ability-computing-5208.file.force.com/file-asset-public/WhatsApp_Image_20231009_at_92742_AM?oid=00DHu000001AdEZ
Resource
win10v2004-20230915-en
General
-
Target
https://ability-computing-5208.file.force.com/file-asset-public/WhatsApp_Image_20231009_at_92742_AM?oid=00DHu000001AdEZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416580281194198" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1448 3948 chrome.exe 53 PID 3948 wrote to memory of 1448 3948 chrome.exe 53 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 5104 3948 chrome.exe 88 PID 3948 wrote to memory of 4016 3948 chrome.exe 90 PID 3948 wrote to memory of 4016 3948 chrome.exe 90 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89 PID 3948 wrote to memory of 2260 3948 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ability-computing-5208.file.force.com/file-asset-public/WhatsApp_Image_20231009_at_92742_AM?oid=00DHu000001AdEZ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffb83a09758,0x7ffb83a09768,0x7ffb83a097782⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:22⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4568 --field-trial-handle=1884,i,1043422228334355229,17197293938190677674,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58932709b856405e1930fa3dbdcd6ca4a
SHA14714ec5840975ea5a14f87e14644f8635fbe0061
SHA2565172d5d3c8f6bbd3c6fb68c8bc663e110d3916cf33ff985da0fadfb980e0b18b
SHA51289f4f977d5976107cec91f4c87c6023a6192ce0e3450f3ad56c9ec0bf40f063031447c66cd347de1e05180a5eecb81283ae29808fdb51bf2ba7a7c82c7536c13
-
Filesize
536B
MD5c0cfd129cd2d36dcd87ce28d4458dcdf
SHA119de1a93581f32359a89c21a4dcade197b056b27
SHA2565ccec4d982cec84990d1f37a2fa3abaa5c01aea1a7aa80a2b68c9094e7f47390
SHA51242dc2daff1515d8cec6afc79ac345b7ca128a7e048158969cedacd47d74d6f53c1ecd9fc77d3ed548e6957a92d8a5cfb0e112ac4bf77b4e89639440a4b22e2a9
-
Filesize
6KB
MD5a1292d35d3acc6baddf051634b544198
SHA153cf95c75662c469af49ac4e69fc468027d93be8
SHA25677ad3fb25089a5c35a18b2d86f1c1018b9693570c1b61fcc8edd7f464d84557a
SHA512b7b7ca375dc6e11e0236ddbaabb56d96daceb3997b7bbdeedbd0c2a9584c9a96c7136df30a053c11ca58c4c63112388f0742b220a1436983a57c9964feea4f30
-
Filesize
101KB
MD51a9291c49a9e827518c78fbaf4485ed9
SHA18eeb3eaf0011ee3831b72fd322b9941f966ecd55
SHA2569e1447c996a9e396af90dd5d4d4e9efd830052e8f27521030a225d1575434803
SHA512b09c4d1a4c6dacbce5dce7f34bf7da273c84339eaaacba3ad9c93a3c9e999e62be482db03ba159b8d871e09a9afd91fa3ac556315532aed6bc9d57a0c57f6831
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd