Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 11:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://allinial.sharepoint.com/:x:/s/AllinialGlobalFileShare/EW7lEiSG4cVcprr8Gzv-IakB8LcZE6zLILXsMpXWLACtAA?e=45MnFQ
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
https://allinial.sharepoint.com/:x:/s/AllinialGlobalFileShare/EW7lEiSG4cVcprr8Gzv-IakB8LcZE6zLILXsMpXWLACtAA?e=45MnFQ
Resource
win10v2004-20231020-en
General
-
Target
https://allinial.sharepoint.com/:x:/s/AllinialGlobalFileShare/EW7lEiSG4cVcprr8Gzv-IakB8LcZE6zLILXsMpXWLACtAA?e=45MnFQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425354055036399" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2676 1632 chrome.exe 83 PID 1632 wrote to memory of 2676 1632 chrome.exe 83 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 2836 1632 chrome.exe 85 PID 1632 wrote to memory of 3540 1632 chrome.exe 87 PID 1632 wrote to memory of 3540 1632 chrome.exe 87 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86 PID 1632 wrote to memory of 1916 1632 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://allinial.sharepoint.com/:x:/s/AllinialGlobalFileShare/EW7lEiSG4cVcprr8Gzv-IakB8LcZE6zLILXsMpXWLACtAA?e=45MnFQ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2e309758,0x7ffe2e309768,0x7ffe2e3097782⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:22⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1896,i,1560653398051466107,341967230598385001,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5e6125f885e78c56ea5da6daea381fe29
SHA15b049aa9abe38ffd8fb97f5175d31518505631d0
SHA256ac522f1398e5a7e3fcf7bc9f0c1c69a4fb14e73ad1d11dc6cb19f4bd54ccd8ed
SHA5125a9978b6967b6aeacb271747017386049b497822c8832412e91f74e35c7c6b1ea3b424e0cd1d87d924bf2a5cc91eab479d88e78990e679269666f3c347ea564c
-
Filesize
1KB
MD53f765758febd77797be57cd58e4e3ec5
SHA17ab594f90ad51f4e691250bef7b84e4fcf727ba4
SHA2562e9a9fe8e15a277d96ab1a918f602161cd45e606cf69e416a01a32c206f7d0b6
SHA512d92970dfd93fcc1469ebd3d98db8dedd24c0d14a6f1bfa9d5e0489476d7af41b36109fae2fce10a1d732c31f69e4f3608a01a7a61fd992dfc17f85e5c331489b
-
Filesize
874B
MD5c48418faaed8fe66cdc0773a0715ad88
SHA16f77841f700c6976bc3e1b0148a519a37ac2e641
SHA256e27fbf54a8224f67551c46bfe27810654d7dc3a7f7b49a15bcf16f032dd26b76
SHA51270481c13b7ffdb1b64bfba1f5f7a6f65d07fd61a5db8bcf7ab9fd850cd71230dc38353079e45ba7e385eabfd55056dc1fcae066b1814c9b8fb1684676c46d312
-
Filesize
5KB
MD5c884a05c1b0235ccd1b4c3e2ecb6f755
SHA1ff2f1cf7b9d4a20166c99899b21d13597db22c32
SHA256d4ee6bcacc65495f09c9d03ae2c78b3267360ec6c20cede9d9b2a0b66ce924b6
SHA512c223fa8be09eded2b9649d91388821c016d7d84b259d44619f689bc0c9d854f8182a0ce75f030a5f592da64acf58123d2c449b204eebedd1c88f3a1ce56ca12d
-
Filesize
5KB
MD59385ebeb6f853e92f8832255a997ec4a
SHA1aab9c6912d8805785a5718f91d1627315b555fd4
SHA2566eff5938971c485279891e3a3f7ae9cfb1291547257bed1112683305fa2f5d15
SHA5128bfbde362d2f9b3e8037ef1cec6b1642e22294fd03a6ae1705dc43913f4404ad714d4a5062cb6d96c7e2c40fb57f94600714724bbbf007d2ca8021f30317a295
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cc5865d8-f484-4116-b995-045b615fd8fc.tmp
Filesize6KB
MD5f23a9143b008875b9b6a41f4298c0d2c
SHA117d93c77b3057b00049606b8207d2840c8ffdcea
SHA2564f0e99d7c34960e44d21b6aa92b6757aec4ff35ba983521c67c46e208bf348bc
SHA5127fa70b1872b084f6a0a18a1bb2534e0aa50c839de1cc00eb1321efc8bf66acc412ca1d69ab9b394703047e76d46f3034173afc75b2882f03847ffa880bca12e1
-
Filesize
109KB
MD5ae38622287d40d88ebeaead703c21f17
SHA154e8801e951e3fe8d1c1d205960743ab3c0a5afc
SHA25600efcd652de08d8ec51f0de7b0f89bc41beff30bada99847f865ff967565c7a3
SHA5122ae975e8a7faf8632c2d9e2b733cbe9e1620618d924056f845f9c1a3d07563d34500086926f54be336d5bce5f323b0beafc73926cfb8fdf7e4c0c0393d9a41fc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd