Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 20:46
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://storage.googleapis.com/inbound-mail-attachments-prod/840dc6b1-677c-4765-8792-e73fc2d150f6?GoogleAccessId=distribution-controller-prod@inbound-mail-attachments.iam.gserviceaccount.com&Expires=1730483391&Signature=KdsD%2FPw%2FiT6M8%2BpgzP958t622JQGhkpuSQoCFOmy9C0LtmgEQ924I7auOrWCIcqafuKEY9Tq3QmMLfZXCKCjzzZJ%2FkHtq7CdlEpCZoocNMEmAOhC%2FeL8Ug9oGqc4oPCNq61N3FXpfyN5kVnUUGHsMyWdeRLwRqZwECkQYlMU7GfouLx7kbiOdmJgjsMI6A5X3Pfx0EorSQ6sQHEYETEPak602EGlvHiu4JiH5SnKV15la2p6d98GtTqdnvmOcb4rm9NT8aBtsN4QYSWV2qU6eUKVgsFvSJMqx13rcUKnQ1P4DwS0qeyGeNSLhJxGBGoIOQXMWs%2FnL1P2HLrTv9%2BIYQ%3D%3D
Resource
win10v2004-20231023-en
General
-
Target
https://storage.googleapis.com/inbound-mail-attachments-prod/840dc6b1-677c-4765-8792-e73fc2d150f6?GoogleAccessId=distribution-controller-prod@inbound-mail-attachments.iam.gserviceaccount.com&Expires=1730483391&Signature=KdsD%2FPw%2FiT6M8%2BpgzP958t622JQGhkpuSQoCFOmy9C0LtmgEQ924I7auOrWCIcqafuKEY9Tq3QmMLfZXCKCjzzZJ%2FkHtq7CdlEpCZoocNMEmAOhC%2FeL8Ug9oGqc4oPCNq61N3FXpfyN5kVnUUGHsMyWdeRLwRqZwECkQYlMU7GfouLx7kbiOdmJgjsMI6A5X3Pfx0EorSQ6sQHEYETEPak602EGlvHiu4JiH5SnKV15la2p6d98GtTqdnvmOcb4rm9NT8aBtsN4QYSWV2qU6eUKVgsFvSJMqx13rcUKnQ1P4DwS0qeyGeNSLhJxGBGoIOQXMWs%2FnL1P2HLrTv9%2BIYQ%3D%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437771815889027" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4728 2520 chrome.exe 64 PID 2520 wrote to memory of 4728 2520 chrome.exe 64 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 3252 2520 chrome.exe 89 PID 2520 wrote to memory of 4340 2520 chrome.exe 90 PID 2520 wrote to memory of 4340 2520 chrome.exe 90 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91 PID 2520 wrote to memory of 4344 2520 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://storage.googleapis.com/inbound-mail-attachments-prod/840dc6b1-677c-4765-8792-e73fc2d150f6?GoogleAccessId=distribution-controller-prod@inbound-mail-attachments.iam.gserviceaccount.com&Expires=1730483391&Signature=KdsD%2FPw%2FiT6M8%2BpgzP958t622JQGhkpuSQoCFOmy9C0LtmgEQ924I7auOrWCIcqafuKEY9Tq3QmMLfZXCKCjzzZJ%2FkHtq7CdlEpCZoocNMEmAOhC%2FeL8Ug9oGqc4oPCNq61N3FXpfyN5kVnUUGHsMyWdeRLwRqZwECkQYlMU7GfouLx7kbiOdmJgjsMI6A5X3Pfx0EorSQ6sQHEYETEPak602EGlvHiu4JiH5SnKV15la2p6d98GtTqdnvmOcb4rm9NT8aBtsN4QYSWV2qU6eUKVgsFvSJMqx13rcUKnQ1P4DwS0qeyGeNSLhJxGBGoIOQXMWs%2FnL1P2HLrTv9%2BIYQ%3D%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb5189758,0x7ffbb5189768,0x7ffbb51897782⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:22⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:82⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1868,i,14047144087383399077,6858736971292423363,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53486ab94e410c73ac7f89af3c04beef4
SHA1671667fcd13823e8d9752763f4cc815beadf3f97
SHA256be6115a0bf314b8d6f3e988c162e3188fe90a25a0c47fba243d029197e07fcc2
SHA512200c988e6fe4effef0db68be51eb141156c1cdf768adf08643b334962bf71fa8a988c035acc19f75be116f48b447028df5ac98d73b477b05b9694ae1ab85d666
-
Filesize
6KB
MD52a0057162ad63c825748eccd6c69ce47
SHA1b1cb9dd2218461bf4742009f6f6f826816e63113
SHA256c1c30f90aed39946307c47a4ca1235236df5a4893ab0b21db9da2575d236abb3
SHA51255ec1ec58680e0fcb632f74cd8b38a673fff522ea03536c7f24534f69ab2dfa05b448ee44eb1af9cbc6fd343ed2660516a185e9e46e66209757c2c63d1f8c666
-
Filesize
214KB
MD5db925e2aba0e056c3ce5ac86556759fc
SHA132d405361f8be643d1629ffc2aea8adb579dc9b0
SHA256820a563d169cdd304e53b596ad09b0529344e9126d2ad677a220b34df6134220
SHA5122ae25c51c475b23d22a6cb2153dadc0f926bcbcf3766a7c5454ef18a06d0057af9c3f829a1d0c11ea2651f01885b2534949cb1ce31882c98c48ef277aae875be
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd