Analysis
-
max time kernel
300s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2023 08:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sngdc.ccms.teleperformance.com/ccms-bin/employee/communication.pl?frmTarget=NEW_COMMUNICATION&employee_ident=5189473&ident=56926723
Resource
win10v2004-20231020-en
General
-
Target
https://www.sngdc.ccms.teleperformance.com/ccms-bin/employee/communication.pl?frmTarget=NEW_COMMUNICATION&employee_ident=5189473&ident=56926723
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437344436678709" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4180 chrome.exe 4180 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4180 chrome.exe 4180 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 976 4180 chrome.exe 40 PID 4180 wrote to memory of 976 4180 chrome.exe 40 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 1384 4180 chrome.exe 91 PID 4180 wrote to memory of 2776 4180 chrome.exe 92 PID 4180 wrote to memory of 2776 4180 chrome.exe 92 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93 PID 4180 wrote to memory of 5116 4180 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.sngdc.ccms.teleperformance.com/ccms-bin/employee/communication.pl?frmTarget=NEW_COMMUNICATION&employee_ident=5189473&ident=569267231⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedc059758,0x7ffedc059768,0x7ffedc0597782⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:22⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1896,i,10584418527290884445,5445807876828422838,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d76a5bcf554e66b344a763e672661ad
SHA1c72ec9654ddb0b9aa21919222fc92d226b1eb16b
SHA256322fe46efd5736a2c8650e513f09bf240e942790dd4992732753f4c946e93f86
SHA512ded67165362578b0458c640230a49b89703010f62842abd7b1480935a60d9f151caa3d5fc2c1374efc7fd1a203dadc9eb438f976ea50fb2c5b28e563c9d94c48
-
Filesize
539B
MD5a2a8ad02dc587b705c5c960441979bd5
SHA1a671680073a6d4aef58879804fb63fc4057bb06e
SHA256ffe5bf73f270e7c4efac678d455e19ea679260a45a6895447383baad33258341
SHA5124f70fbc57f9ad14e7d30d7f1cf17a845c234f91e3c79c58f70a8770a9a1db082212b6c3903e40849d684a18ca49897cef83c92547c8272c2d95d411d9c465737
-
Filesize
6KB
MD5a357708f5d922f7c6b4fcc452576137b
SHA1e0bcdfffdc9436f0097a7d92f2cc1b6c7d63e4e2
SHA25654ae6499e41264051e4b92ac1474bdc4aec8cdd8751596d82fa96be0ae4591d6
SHA5129d8538eaae3cd3c4e60aeea163e76ccbd58b74253124a436d8a94a20426122d07e8c15f520b767f3958e8b144b44d1d8efe39eeacdac803212ba5c328e3060e0
-
Filesize
109KB
MD5dab449007d9b86b9c8a09851809f14f3
SHA1ad3390d47906de86db09ffbdebfbc559ab7a81f2
SHA25642acbe6749d1de20b50e76ada39c4bc8ba4bec43a1469c8809c18ea8506f0df2
SHA5128083d6d629911d97edc2c55b05cfcbbd1b6ed2b6fab739f99d97ab098a2d74ab4ecb2a646133413099ba326da006dbf137d0c3633dee49b987636dd48cd4f020
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd