Analysis
-
max time kernel
52s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 15:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://czv-104.na1.hubspotlinks.com/Ctc/RI+113/cZv-104/VX4nnz5x3CTJW75Zf783TrkfNW3pvQRf55mxk1M5Y3kd3qn9gW7lCdLW6lZ3l6W5jpdth2_rSbzW3KvQWY7YTLGpN4dqtlXJz_26W7ZJ_Cw8jlZHDW4tg9V17sqx3yW3Bn_tp20FDCVN1GgrHt4vJm7W2HgDFZ8QTnl7W43B-CJ2vPw5LN2vKcf0LM6mRW8fLY6p1CK991W2G09nt6ZbJGzW5YPYLF3crWMZW4tWclz7smj6-W2SjN611Fct8hW4vv0xJ6pv95HN8Zdk7077tDlW93B_pq1cp3yQW2Vqq805TGgKKW7JyytV9jJKLSW5cXgCp8QFQ2ZW8hmsmm1dyQfKN7b1srycl41ZVyNjnt3Rbt68f7bmKDP04
Resource
win10v2004-20231020-en
General
-
Target
https://czv-104.na1.hubspotlinks.com/Ctc/RI+113/cZv-104/VX4nnz5x3CTJW75Zf783TrkfNW3pvQRf55mxk1M5Y3kd3qn9gW7lCdLW6lZ3l6W5jpdth2_rSbzW3KvQWY7YTLGpN4dqtlXJz_26W7ZJ_Cw8jlZHDW4tg9V17sqx3yW3Bn_tp20FDCVN1GgrHt4vJm7W2HgDFZ8QTnl7W43B-CJ2vPw5LN2vKcf0LM6mRW8fLY6p1CK991W2G09nt6ZbJGzW5YPYLF3crWMZW4tWclz7smj6-W2SjN611Fct8hW4vv0xJ6pv95HN8Zdk7077tDlW93B_pq1cp3yQW2Vqq805TGgKKW7JyytV9jJKLSW5cXgCp8QFQ2ZW8hmsmm1dyQfKN7b1srycl41ZVyNjnt3Rbt68f7bmKDP04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434137168060303" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1144 1120 chrome.exe 35 PID 1120 wrote to memory of 1144 1120 chrome.exe 35 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 3912 1120 chrome.exe 90 PID 1120 wrote to memory of 4208 1120 chrome.exe 89 PID 1120 wrote to memory of 4208 1120 chrome.exe 89 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91 PID 1120 wrote to memory of 4952 1120 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://czv-104.na1.hubspotlinks.com/Ctc/RI+113/cZv-104/VX4nnz5x3CTJW75Zf783TrkfNW3pvQRf55mxk1M5Y3kd3qn9gW7lCdLW6lZ3l6W5jpdth2_rSbzW3KvQWY7YTLGpN4dqtlXJz_26W7ZJ_Cw8jlZHDW4tg9V17sqx3yW3Bn_tp20FDCVN1GgrHt4vJm7W2HgDFZ8QTnl7W43B-CJ2vPw5LN2vKcf0LM6mRW8fLY6p1CK991W2G09nt6ZbJGzW5YPYLF3crWMZW4tWclz7smj6-W2SjN611Fct8hW4vv0xJ6pv95HN8Zdk7077tDlW93B_pq1cp3yQW2Vqq805TGgKKW7JyytV9jJKLSW5cXgCp8QFQ2ZW8hmsmm1dyQfKN7b1srycl41ZVyNjnt3Rbt68f7bmKDP041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb849758,0x7ffffb849768,0x7ffffb8497782⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:22⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3284 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3264 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4768 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3504 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 --field-trial-handle=1876,i,5427726057369182941,13986386000427290667,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1720
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c4 0x3fc1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b464d268d765dbe3d5f7d13bca2cab6
SHA11377d08c57e19abdc2c09df2a4682a71ac63bf90
SHA256f55b1aa2bd53bae776f52baeec01f99e813b3a02d46f71bc95966192fd6517a4
SHA512866c1aec5f5433d55542406d7c7845e45a5306e751329a47536d27964538e3cc2bd581037779c8a3d453b9bcc2486d8d66d50594c939b67b58bb45bfd28beeec
-
Filesize
2KB
MD574353974d522658ee2dda0647615d32c
SHA168b6033ba323ee72245e1637d4b25cfdb1242c1a
SHA2568c7ea3188542678a2ad1c3ce141ba0d2b71eb74c517d794f722d38033a285e4f
SHA512b3aff39792c1c27e27d92c2156ddd57c42d953189cc3129f81d06f6e76791035cdabc37fdf525a49d866d3ea3d569d55b963849a4c3759dbbc765bc39819d0e3
-
Filesize
6KB
MD5daa051032bd310b25bac0ee52ab8b9f5
SHA13ada0e607a67b2882d6c004e9986487f42065133
SHA25608138356372cf679bc74a5f297d6d1c4bc9c33f8c8d4b8324103632d19e08105
SHA51292ef0ae7cc2890efe48273cf29cc83ccf826981e2d309f6707af485e5c964ad23ee11849bb7d0b10fca35950ad007ad0e21a2840e4edc75c2d1d7bf2b9076556
-
Filesize
109KB
MD51cdc0332cc2db0226b1055f9d61d9c2c
SHA14c2aa8be31c5fc646a9518f965d589d6caeb5973
SHA256989149a1585a3b59fe102bba52454dbebc543125cdc5baef36508cdfef92b16c
SHA5129ea119b0d17318b7bf327b901454cfa0082ec9e8151cf340365eb76704d1eb0ca1571764f68cf9d4d0b1bf13a16d007d885129e4f7894537b50e0e8395a89cf5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd