Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 07:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bankofamerica.co1.qualtrics.com/jfe/form/SV_41PegzDndS9zTNA?Q_DL=rmSdfh4PmAes5aL_41PegzDndS9zTNA_CGC_K412fKgpR7p7J3h&Q_CHL=email
Resource
win10v2004-20231023-en
General
-
Target
https://bankofamerica.co1.qualtrics.com/jfe/form/SV_41PegzDndS9zTNA?Q_DL=rmSdfh4PmAes5aL_41PegzDndS9zTNA_CGC_K412fKgpR7p7J3h&Q_CHL=email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2780 2884 chrome.exe 25 PID 2884 wrote to memory of 2780 2884 chrome.exe 25 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 1784 2884 chrome.exe 83 PID 2884 wrote to memory of 4836 2884 chrome.exe 84 PID 2884 wrote to memory of 4836 2884 chrome.exe 84 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85 PID 2884 wrote to memory of 3164 2884 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bankofamerica.co1.qualtrics.com/jfe/form/SV_41PegzDndS9zTNA?Q_DL=rmSdfh4PmAes5aL_41PegzDndS9zTNA_CGC_K412fKgpR7p7J3h&Q_CHL=email1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef7da9758,0x7ffef7da9768,0x7ffef7da97782⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:22⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:12⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2388 --field-trial-handle=1848,i,1230485994259703277,2219893147957889212,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5673204c7cb078e9c31f5b3f84028a617
SHA1bbc70ac54be41f1df5ff129dce075256e2024c57
SHA2561eb295d55a29222c43ac19e1afbfc8d4dd14e974582f5c4a6170f45acc177bb8
SHA5128fcc072ffe0c80df2e528473e5822022d77f59f3ecb1260d26d2bbfe69cda367d6e2260601f0f469fb294a8c2d6d7a8e59229d8f967369783ff31ceaf2da3b7d
-
Filesize
1KB
MD5ab7285f9a14f44f595a91346bfb1377b
SHA19c3060fc9002ffd31b8a41385bd2b573d8cdeb97
SHA256c289415f381fdf15c4b465a03b251c4547130a1fd1613206e44355bc38f541f4
SHA5128208d89df94206e2038665220c0db86aa102b80418b14b666d2e1b11c7ceed4fcc202540541dbfaa76225574d7a1bbd3c8bad77d0113980589b1eae8aea2888b
-
Filesize
534B
MD5ad5d05b3e3b29f406379cd3eb84a579a
SHA150259f04eb31fea2305117e9b1388aef16dc098c
SHA256154f2ba2fc1bd39fc28ae097f90ef7308e8bbff264240ab7988df96e9bb4e88a
SHA512ecee4186d4643b1306acdabb5c8fecc5bab5d6d9b786053a0fba77f2c78edc7d8bf28c171ba87da681c463244e30832f45759a9180166890293947138e650aab
-
Filesize
5KB
MD5736fa4552b45b3814b30f848118dcb92
SHA1b147f012cacc4268282144c45896a8c819fd57b4
SHA256946488aaa6ec50a66d63175f57f67910c6c2e18e19e76740e0e424b10b43333c
SHA512adbd784975ce6399cb8f79d771fbae6af4904907b020ac5eac20f803d229849158490e98902ce08c966f98b65366640dd9eacaad9a1aa7b3586fd5af4fdfc767
-
Filesize
5KB
MD5b34b8144a68793cd211c291af5cda759
SHA139a0eeccea398e7cd1f5e1c6896b8757ae6a63be
SHA256a7a2e48af0d8a29c75aa77a9f6158a733d9a31febbebb792b945fb8ec9ac22f2
SHA5124c0385da11e013a8a349d0ce4deddaa68d8f1f6b4ea1e3764ed9c168c30f53d71fa726d2e467f1ffc4fd6fd30d6eb02ae885888839cdc3e61713cdc947528c0c
-
Filesize
6KB
MD5c4c42acdef2b8d4bc31e5c040e9c546f
SHA11a61751c11b8bfe6b7a99fca43f6cda8fdb4c8c7
SHA256ba34e29dff9fde89a9fadaef4fdf7803a618ed716bcd6292c2afaddb172a64cf
SHA512b5c2d12d18fd507481a1a2bf89e2d5e71a0cfad57d591b916db6ea516cc98d1321bce643db87b23c16a2818e00eba2d9b25cc23564719f6aeb6ba5ced1000176
-
Filesize
109KB
MD5ba04f3de84a4443ad4f6504ab1f1d2f9
SHA10c8d87d2fd1201b2ce1d413c831ba7ca4d4dae71
SHA25666c734c50da99301885dc8922fd88a05480dab81cba913930b5b99dc7b8a8342
SHA512f0442ac11e661b18b53d5d16bb7ebbda7dbf7f4574573083717567f811717a94a6e6cea446de3d9da46c7666282bdbca0e53dad91eaed0ff6331bd68b220b5c1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd