Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 10:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.responses.att-mail.com/e/er?s=1981585949&lid=9097&elqTrackId=9b248bd41fa443efa59135d78325dcbf&elq=acb535569ed4474990b20b7bd8f83eb8&elqaid=12875&elqat=1
Resource
win10v2004-20231023-en
General
-
Target
https://app.responses.att-mail.com/e/er?s=1981585949&lid=9097&elqTrackId=9b248bd41fa443efa59135d78325dcbf&elq=acb535569ed4474990b20b7bd8f83eb8&elqaid=12875&elqat=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133438253432702995" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2344 1660 chrome.exe 27 PID 1660 wrote to memory of 2344 1660 chrome.exe 27 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 2624 1660 chrome.exe 90 PID 1660 wrote to memory of 380 1660 chrome.exe 91 PID 1660 wrote to memory of 380 1660 chrome.exe 91 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92 PID 1660 wrote to memory of 1020 1660 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.responses.att-mail.com/e/er?s=1981585949&lid=9097&elqTrackId=9b248bd41fa443efa59135d78325dcbf&elq=acb535569ed4474990b20b7bd8f83eb8&elqaid=12875&elqat=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffb97dc9758,0x7ffb97dc9768,0x7ffb97dc97782⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:22⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3992 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5000 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3328 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5168 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:82⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:82⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 --field-trial-handle=1804,i,6590906659599757163,3179890031250079891,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD5653a13f1b6df2ce2f5844c5cf421ca19
SHA12457b01e053e843f2618f485b220d8db9641132c
SHA25692d9e0fa382ba2278a1ff1a9f4584cdb3af3adf57e32466c93ffe7417a4182dd
SHA51212d6cd305b6bd7aa47f2dc48e6412505436a9035c4404a18af807ad9c3749e11c525f5b1fa06faa6cd4f9712086f7c798feabe6e9f3532c7451130c576b94e8e
-
Filesize
4KB
MD5d47ff964d0251ef63829e31b1c685b94
SHA1adf3a1d51134cca0cf0cde5ad9b829ba83ea5152
SHA256bde5aec22e706bf54781a872634dfaae85dcc9d1605a0a9fa59accc9d710cc54
SHA5120a045a18c6e71eda7b093b3416279959286666adf391761c9f735a5d71eb2c88c09cb954d497fe7c9140d98e78922fce609bb8db9247c08888f991d4970d92df
-
Filesize
3KB
MD5656865f531eb9e7b75d6d91001cedd70
SHA1ba7ff5a43dd779104ac55183344bc4d0380bb63a
SHA256ab7e3669e81004f8e1e18f39db18d549850160d5f693c966a8ee5ecb05677eb4
SHA512fce1323c0ef8923b647b2d7e8b6c3673fc72fa7ad0c7d4f6f579e1bc42ed8c44780cdc6607ceb8b1b7a39d49c42f91810503d24546a0edc946496cec7781b2fc
-
Filesize
3KB
MD5d2f27b74576f824031e41a08089ddfd3
SHA15319de4dd6c77e2f21f332873a250f283f9ea759
SHA2566d5e06477d22b0f18471d6d0f98eea7a9a3c78c72aa7f15a3576e45004ddabec
SHA512069b319693093d0e04e6cb8116bb93d7830cb7d6feed492d128c9dc6c0adcec5eb0c2fef1987695a411b2d752c0f643c9e0ae04f9b8ec93c9a346c0e4a850f1f
-
Filesize
3KB
MD52eb4b84f3f1a889a265850837e5f2b92
SHA11d318acabde82ae973911a2dd629cf9b5a6c3727
SHA256609eef3c37cf63aeafc80a05c8604bd3122cf47ad410a28e91be0de08bdebc01
SHA51265382b285ca178469f34abbc2357f94a91574e1afb28cf00f6e257b0f9919730cfb4de657505a53a9d6de0581459968dd580ddacdd123812f444101d6c050a4e
-
Filesize
6KB
MD511d9edb5a739c09f7947f335c400a11d
SHA1c06890390021d49af52ef09f290def3f5b2b9434
SHA2563df1bbe422b25f8be7b8ad97866175744df47478799feb99d12ea1308c54727f
SHA5120dc4508178ccec6a5bf3d8d5d7264ae10173a6524d84d636685593f739ccfb76c351dcf1260ffb9d1c2bb558b38746e60d6c5a82e3f5fbcbf752907b414ea04e
-
Filesize
109KB
MD522f3fcb8f1bbee070c6bb166bc61bfcc
SHA17d14e07dfcef67fcd84296778956632cebef8d1a
SHA256c85f565f5d6e8e6d96e05eb1ab5acb8cf56139ea4bf68f23d0d0de93e8d0e211
SHA512f512f57da9d9a17529198d571e8d4e667191961128b98facbc6522fe6bd7a533899e24259a87f86c003b6b78a6707ffd197439d539f39cf09d96dbae9ea5c3e1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd