Analysis
-
max time kernel
1799s -
max time network
1697s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
30-10-2023 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D
Resource
win10v2004-20231020-es
General
-
Target
https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431504599685278" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 232 chrome.exe 232 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2772 1988 chrome.exe 78 PID 1988 wrote to memory of 2772 1988 chrome.exe 78 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 2528 1988 chrome.exe 87 PID 1988 wrote to memory of 1504 1988 chrome.exe 89 PID 1988 wrote to memory of 1504 1988 chrome.exe 89 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88 PID 1988 wrote to memory of 1304 1988 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87f689758,0x7ff87f689768,0x7ff87f6897782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:22⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1776 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4772 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1884,i,406098141541691066,5157273878388571240,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a34fba528928b4c1d23c9ed749230ba5
SHA1be02fcbcbdda45e2f23b72ea52ac13c6aa8e7927
SHA256a4dc4941b86862e82b4ce06bf860daa2b9cf53ae7cdb44cd3c7f1946993f2931
SHA512f6f6119419b5dde250fcb54a7a7374c54652b04e9b608e1f7a14cabd522d98027e67df2e1e1e87fe71ad055643a7cf02ff952e1e717eee7d334e39e2fbd0b5df
-
Filesize
1KB
MD591f785300b1b2424217f8817e8c32070
SHA110ea84924a5ed1c3c5328f1c28db8180f4d0aa34
SHA256208f23a43ce8e457e2c36962d482e58feae4b88437e891374fae9a2332b37efc
SHA512615ebc4446853ab452ef897e230f8bbc53a4f6ea757ad42fe2dae2277bcf365f63108ac01cb158053372e73faedf2fa49dccff39c3c6e9f074d97642b0045d9d
-
Filesize
538B
MD5cb908a71907075d4370e6cae92f5bbea
SHA118d561078e0a65fd85742018bd7a8b139ee5f230
SHA256d274c2c2b78d49426379b6490eabd0c63f93d7ec28b8844aaa8e85d9662606a5
SHA5128ed20af18b2d0ea8ac71a1c30efb22d72888ef681c21ee53f0052e2f475900a8e999e32c64c2234694adc154a88879e69741d1531b405085ffdba4edccf82348
-
Filesize
6KB
MD5700dc9cf7d9742094cbc8937abfe575d
SHA19cd348dffc38b5bee197b47cdb25a3871daed472
SHA2561608e80a0e0153728e8052e149f904647ca29accd6a265d9a2f7bee61ab615bb
SHA512ec81e6703e33fab052f8c17380ff4112294dd8e37e0d0ae14e9f5aff3c411251ef111254d8cf1c1bc06972a2c8a3ed467fbc6353983b7424c6a947c98dbe6854
-
Filesize
109KB
MD51b48390f4e83176d8b223cb001fcced3
SHA1f0c17ddda3d7cfa3ef6b43964d51d37d52b20895
SHA2569945fef2f2ccb800e801ceab1f71bace8abaaf99b5dce344fd07735c585e4e94
SHA512d41c86b76d618e711033c05d6ee4113fe78f7537bc36a691a40e60e3ee3575d51b97d8ffed5747cf0fc9c13f2511830933c7188cf6bb262bb9c4956b76c22672
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd