Analysis
-
max time kernel
6s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2023 06:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://adlsaqa.qualtrics.com/CP/Register.php?OptOut=true&RID=CGC_IHhjpy7ix5ob7Hh&LID=UR_0VfWkiXWjMyIt1k&DID=EMD_V9cXlYnhVViVNyz&BT=YWRsc2FxYQ&_=1
Resource
win10-20231023-en
General
-
Target
https://adlsaqa.qualtrics.com/CP/Register.php?OptOut=true&RID=CGC_IHhjpy7ix5ob7Hh&LID=UR_0VfWkiXWjMyIt1k&DID=EMD_V9cXlYnhVViVNyz&BT=YWRsc2FxYQ&_=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133443295079868702" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1636 chrome.exe 1636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1636 chrome.exe 1636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1636 chrome.exe Token: SeCreatePagefilePrivilege 1636 chrome.exe Token: SeShutdownPrivilege 1636 chrome.exe Token: SeCreatePagefilePrivilege 1636 chrome.exe Token: SeShutdownPrivilege 1636 chrome.exe Token: SeCreatePagefilePrivilege 1636 chrome.exe Token: SeShutdownPrivilege 1636 chrome.exe Token: SeCreatePagefilePrivilege 1636 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe 1636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3328 1636 chrome.exe 71 PID 1636 wrote to memory of 3328 1636 chrome.exe 71 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 1496 1636 chrome.exe 74 PID 1636 wrote to memory of 5004 1636 chrome.exe 73 PID 1636 wrote to memory of 5004 1636 chrome.exe 73 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75 PID 1636 wrote to memory of 1092 1636 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://adlsaqa.qualtrics.com/CP/Register.php?OptOut=true&RID=CGC_IHhjpy7ix5ob7Hh&LID=UR_0VfWkiXWjMyIt1k&DID=EMD_V9cXlYnhVViVNyz&BT=YWRsc2FxYQ&_=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9a3dd9758,0x7ff9a3dd9768,0x7ff9a3dd97782⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:12⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3480 --field-trial-handle=1512,i,7155416558767158173,18173324713301757896,131072 /prefetch:22⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\76e5fb38-90c2-4072-8ae1-e454a7e8af91.tmp
Filesize6KB
MD538556b53a1cfab9f424d126b7fa820c3
SHA152b7dfdae18ace007126deb2f5a1dda0f64e21cc
SHA25653b6989e7fab84f7590411e56c0f5d34650c045d6094bc104c70cdaaf23a2098
SHA5127783a08de6a7bd525514d739da581d7a7a9818591de8af0368f8664117fb2fc27d58369dc1abdb8330b801a18747ccd82a8da5058ceefe07137a0d56679cc277
-
Filesize
1KB
MD5fe72d3f8ba30bc2ae614fc472f18289e
SHA199cf6b7d5b0754c9475bc20f69f8625a915886ac
SHA256e73daf671b517a9dc52d7dc594b15da7a584e0f3a5385a3d689610feab844070
SHA5121e766afe9a394b78c51b8722f75ae03ecebccecff551a3b5246eff2dcc1a204a5afbdb107dd74cef236e04260f65886d556659855bab9a124df93656a9f5a5aa
-
Filesize
705B
MD55fbe16f603f7ad6e294bd5eaa4497725
SHA118a8478581db2011a0f2b8917da70f21231ce8d2
SHA25658700a7f8e56d2395c46fa9593cabfcf32180daa1b2a2f746ab30cdaea1db433
SHA512136c15ecbea20deb5bb2e421ea360f5b475ba96064fc5d611900ff8a0d7a1bb4c68e504c26bfeb3f36995fd5358923f6e4b8bc88263d52239dcceeba51fe2f62
-
Filesize
5KB
MD555269d086c589705315110e42ab8132f
SHA1a664edcd5dec05ef93eb54ff43d967578d530e12
SHA256deec3e5df4f49d96770b1aad3753070bfcefb9532cfa6f672c5a8940ce4dffe7
SHA512c7d1a4e2203c3b348252fb44f6886556ae000c3c4e9388c33dec7dae60a26ed42796011b4203d5c38934fd9ca2684763a0a9d8ca7a2e29888114bc640a44b8b0
-
Filesize
5KB
MD58378168d578e95447cbb834de946d291
SHA12658940b852f95df3d825d1ccc47cd27e95ecb1d
SHA256a3374de86bced3251c301fdbf654ca7ca94c0e0f3e604032f0d77c056753c6cc
SHA512f01df1243bacc4abf13a902704bf0461146186d99f23d73c87a0397f77486276fa0c129fda578c9ff48d688d982696298d43da2aecc4befc5cdb573771b90fe9
-
Filesize
111KB
MD5d14409780fb7bb43209265d9fccf3fd7
SHA11701212c46b7bdbb5271497ab0d2c927bed02c25
SHA25608a518390df426ce013d4a959a2c1ac8edaccb76a328b3cc5affdfda056c3615
SHA512e3d54925378f4e2036afbaa71fb68290bbc6a5fdcca8d6f9c97ce85848a9be84cb1bb7240a11f4583627d03db96a3a511e511256626bcecea3095f80f91bc478
-
Filesize
129KB
MD5429d255f828dd4de6325ac6b213cdf14
SHA1e268980aceeda736f74a4540a77e085ba3084b80
SHA256bda25e11c0099c0a5c7cb5b757d95b91f710a8596a45c2f5a67a83a5b2029fa9
SHA5128441e4905d145361eeba1f26f49969814a48b67ec28808c6fd2737e694837614eb27edb2f8928980ae7c15653eeede4cf4c96971de3f7454285337040e1f5215
-
Filesize
110KB
MD5e43c94273f62d30b92c1d0a1c6c00db8
SHA19f1ed96e9d7e4fff9c2ed75f76d481deceba589b
SHA2566922a63fca523662c19dda29f043317d4aaf7e5341de2c5a683ced886e7b10b4
SHA5123f201482cff5ab049a4f2d8205e8e83cd5b7b90ee2faa5f707e1bd295bc7a6ce2c7fc678b7bd09dc7d54292f1c5b2998cf29e1f4d83ede1b8979a790e3c88e23
-
Filesize
110KB
MD54d88fb79ca2e698067ecf09523e2d1c7
SHA12f187ce7c9caac044e97d6876056d6ebac4980d0
SHA2565b44e244ee242a96832a454eb6016f6446a635b638e0639897212e40df99b220
SHA512afb3ec6a85be7b790f4387f223d896944d12e2305e6af779f86713e000d9f70e96be552e970ed09b23a62358fea1d00f10c8a2fc027fb795addb46eb2b39bdfb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd