Analysis
-
max time kernel
60s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 08:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clicks.icims.eu/f/a/FSAgWMo0yP5ALcROpB-ZBg~~/AAAfxgA~/RgRnJxvuP0QxaHR0cHM6Ly9lbi1jYXJlZXJzLWhvdmlvbmUuaWNpbXMuY29tL3IuanNwP3A9OTgxM1cFc3BjZXVCCmVB7pZEZcWNVZtSFFNRVUlOVEFMQEhPVklPTkUuQ09NWAQAAABj
Resource
win10v2004-20231023-en
General
-
Target
https://clicks.icims.eu/f/a/FSAgWMo0yP5ALcROpB-ZBg~~/AAAfxgA~/RgRnJxvuP0QxaHR0cHM6Ly9lbi1jYXJlZXJzLWhvdmlvbmUuaWNpbXMuY29tL3IuanNwP3A9OTgxM1cFc3BjZXVCCmVB7pZEZcWNVZtSFFNRVUlOVEFMQEhPVklPTkUuQ09NWAQAAABj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434738190245173" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3824 4500 chrome.exe 86 PID 4500 wrote to memory of 3824 4500 chrome.exe 86 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2436 4500 chrome.exe 88 PID 4500 wrote to memory of 2780 4500 chrome.exe 89 PID 4500 wrote to memory of 2780 4500 chrome.exe 89 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90 PID 4500 wrote to memory of 5024 4500 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://clicks.icims.eu/f/a/FSAgWMo0yP5ALcROpB-ZBg~~/AAAfxgA~/RgRnJxvuP0QxaHR0cHM6Ly9lbi1jYXJlZXJzLWhvdmlvbmUuaWNpbXMuY29tL3IuanNwP3A9OTgxM1cFc3BjZXVCCmVB7pZEZcWNVZtSFFNRVUlOVEFMQEhPVklPTkUuQ09NWAQAAABj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff940719758,0x7ff940719768,0x7ff9407197782⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:22⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:12⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1904,i,17611548189123758729,4778784360594146725,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a403314df349e107d847240c916616b5
SHA1c3ce964d1c203b3638c1c9641828b24338c1abfa
SHA2560608b71b674440844b8a7e9af676943b18f580f7813269c857987b9420682d98
SHA512ae90b63be424d71d74e1f65628d84c15aad282d779e5ea9abacdc292848598bbd48457aca98a085e168e2f31cd6b138fcb1e92d5ea05eb71334dea426c1d7958
-
Filesize
6KB
MD57687a4c4712bc64520ddc7b34d8c551c
SHA11bbd12700b5117e3153e147e7377f717a8f94e44
SHA256f7ba6c0345625d194c80cb8c2a3967b6c58ab14230856229b31fc39ce7c7d649
SHA512f6c4724bae9341c8695018134792dbd3d4e27704a6b529eed438e4477dbfac0bf8655c219f3ec8ebd08e7983517c9c0505ceec579b4141dd63b8c86284d2b900
-
Filesize
214KB
MD5b1070bdcdaf7d88274a2a4ca0b58ff35
SHA189082ebe879869a1d27286b893be284729e6656e
SHA2562239e48d80ce185e19d51f0480609052a3b1d2c9c90f0f0b17142cbea15f65b5
SHA512ebf14ae86f27e811ce226c3a8a1b3bf36e574202090b73941d3f667c698fee1fe1f6a91b898f858f845a4610bfba14d05288680046347e455da7cdf4a270354a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd