Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 20:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://presentations.yesware.com/183806585f3c6101f0051c7e1190ca7f
Resource
win10v2004-20231023-en
General
-
Target
https://presentations.yesware.com/183806585f3c6101f0051c7e1190ca7f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433431181021569" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1376 4812 chrome.exe 86 PID 4812 wrote to memory of 1376 4812 chrome.exe 86 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 844 4812 chrome.exe 89 PID 4812 wrote to memory of 2688 4812 chrome.exe 88 PID 4812 wrote to memory of 2688 4812 chrome.exe 88 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90 PID 4812 wrote to memory of 2788 4812 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://presentations.yesware.com/183806585f3c6101f0051c7e1190ca7f1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xdc,0x100,0x104,0x80,0x108,0x7fff5d2e9758,0x7fff5d2e9768,0x7fff5d2e97782⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:22⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5400 --field-trial-handle=1876,i,2236789352719940863,3394245847227203638,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD567fc33cf9cc84d689e6ec43ae915464b
SHA122cd587ed5c11437eca0ac1342ff1d267f4a1546
SHA25608d373202dbeb67ce4c34d76447c0ae9779481d119778bb5bc748bcba36f68cb
SHA51283ecb70fe749b15453c933dd6be358d95c513d5ad1a17df74f5747af89ca9c000ce782d99658e2751168eda245430c9207bc28bc1ece7cd283c0158559d0fb3f
-
Filesize
2KB
MD5a5e2d135cb1db8e34bcada3a81b96746
SHA12ad99b2c9cb684e539d094a60c83328b68ffe487
SHA256dfe6d24a509c5dbf2c815ec415a9eb9882a0d37e1c0dd3f539f4f531216d8407
SHA512a5ab6472d445cd4467da6e5390af234310f85c66d3e8588eb4984a24a671a2444bbea99915e29bc64d69ba9dcf326faca7f338310b1902aff1c20739b2bf5723
-
Filesize
1KB
MD53ffc5124aa47cd4031d0d468726a1ce0
SHA1074419a8d7c99f3c4236aed35993dfc999e7e2b3
SHA256f91e7801c9d7998abedb680fa595de8a211d5c44c41ff9043328c36fcf266555
SHA512b62d059578fefa3a468afd0a0ad82c6f630f171a1507ae44b04158b1fc9da1036c5d0ba1d0926dd5820331ca1c3dd3b6224cb9a6189d4eaf81fd006c8a9cf425
-
Filesize
1KB
MD557e3c0714a8bcbee5cece997372c6bac
SHA11c8f37d669f19db7446a430d86a402d22ff6a4f4
SHA256dc069f50b811d8f55608492eb505ff738946b622753c087d6e5605d98b6a9aeb
SHA5127d6bbd114bf6b2488376ff28997cf97492b6b8002cf65e7bfa93b957a7dc4262588f71eb681078251d14de578d7c81fd0acf0b7d2ddffae7c786e6281343238e
-
Filesize
1KB
MD512682613965bb99deb7f274572ea239f
SHA18d6c94511d5980795cddf9050ed1b159c0e2896d
SHA256f2f8a6490b38f5b2e1754681add98c587bb4f626101bbb8bc1143e14efd7903f
SHA512e5534b2a343162f32f9b9e16a4550dda61c4e72d79da053b931a83f061bd36a13cfed50912a083f3c9a120eecbfffbfb66264f638185fa734ed5f52fc453d505
-
Filesize
6KB
MD5b1ba8838f8135d4165352acae25bcc79
SHA1106dfeec0786ddad55289fa4471470f664aec889
SHA25601d31991e1cfddd5acf41158cf3504774eb5edf3d058a37bdf57e52696a1ad89
SHA512a6621f3928b81e584bfce5873b4ea7d232de584da0b973fb0d1fe8006ab533fd336a4a80804707dfc0a34d4de545a8e4e2f10a18a0322fc9f68b745f3d27b420
-
Filesize
109KB
MD56df8d20c725516eae54dc30332894fcb
SHA11c8eab6c9d9f88661d4ba562c0e28edc21e0a8ee
SHA2569e3ab37f20a7202c22f3fb07016ac2ab611573b8e1a70f4b53a846f3f31853ce
SHA512d1fee38d1d5f00ca7cf00f8d381dca8ff18ccd0b282360fa42a5138880342dbcb344a56285018b1b01d0395df9f3ac588f43f6752e758302028c6c08365455db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd