Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 06:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://princeton.international/event/strategic-marketing-conference-2023/
Resource
win10v2004-20231025-en
General
-
Target
https://princeton.international/event/strategic-marketing-conference-2023/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133443308941285054" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe Token: SeShutdownPrivilege 3580 chrome.exe Token: SeCreatePagefilePrivilege 3580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 4808 3580 chrome.exe 55 PID 3580 wrote to memory of 4808 3580 chrome.exe 55 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 4316 3580 chrome.exe 88 PID 3580 wrote to memory of 116 3580 chrome.exe 89 PID 3580 wrote to memory of 116 3580 chrome.exe 89 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90 PID 3580 wrote to memory of 5020 3580 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://princeton.international/event/strategic-marketing-conference-2023/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd73a19758,0x7ffd73a19768,0x7ffd73a197782⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5420 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 --field-trial-handle=1920,i,12144492994928810427,3551423380723721754,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD53946df69aa045db65923b34a4e902776
SHA1e642bad1fcd3845a5e68540d7c7302360ceb740b
SHA256824f8d82db1727b4d8090b8867a3df44f6035e202eda8fbd543b109026b75893
SHA512709b9a70519ced70da903889cf4bc7429f805b233c0851c43945bae605355769cb6c2447f1c42e02e7b1887047d6e7eb9a42014500cf9cfc1752130e0fe0328a
-
Filesize
1KB
MD5e2226bb57d978ee62c10b71add2e8f8f
SHA14201c87347dc0f301c32a4167135619d115a7fde
SHA2562cdd9cd75cc54ddfc6eec313f6c0ba38b833b61b4d77f3a2cdc1bb99a7398bc7
SHA5126dcfa126fd90d339b2afe5fad5cb374a146a4c7428e32cb1471cfd57186f79a360c38bbe2657df448e100e2be2195e54c289be42af4f62c8184a27c9cb8c91ed
-
Filesize
2KB
MD56c844c6d7a7ac72f8d39759654ac6cea
SHA150911d066e933b65b107157fe2cbf3bfc2c5572d
SHA256be7ba1b4d110ff84b0d496f5f0cd33339efc426b7f07f82dfbddbe2d1336de91
SHA5125a3ffa99a1201f095f37a25d3502a8940f860431b23c5185641341784e5d955b7e265f47cf67b50d9b1a87578152d73c32e15dc140c879a95db688d2dbf95fc4
-
Filesize
1KB
MD5f9aed481f1e49c8951e69ef99f3b68c3
SHA1fbef43afe279bc79dac244006e3c8f293947cb9d
SHA2567ab1aff8e31da8ed2d8e72cc8c488b70ab9ffe9af6d4e8cce109210baf70914f
SHA512e97d08e7b67abc8f8c67dfb81f6fd5ba1ced1fba8e989e5b294ad04ed962a0fafb4637ab603dbbdfda0cfb89b2d67e72338ce259c42c18a9de71fccebd9e6209
-
Filesize
1KB
MD5a22900dd588375bd033915f2db23ed36
SHA1cda7627480405828ba9b847312a6bf05f671fdc2
SHA256030010a8dc11adb56d39de591f0ca623666e0e3d6b4f1a87377ab371c0ed4f7a
SHA512308a7b6a4560b16344c16da7de15374c3c8a8960299a3298a24996a2680426301638612bd8ad551bd9c1d024a49e56f793493934530bcc2a5909f954764a2e60
-
Filesize
539B
MD503d0bce8907c9d2fbfea8e4d54b2a360
SHA1fa06061001be5da88ca8a9d29d71d20b5662c76b
SHA256cb0a328736fb84734b153f58490af9b452b36cf5568b7d014c3dc8deb8cac739
SHA51223423468d3dceadd1dd1c539887709c9d6aaafa7e5e178e6933c98299aa113caa8c1eaa2a422b553f91ac5b5acd194f600c516953c9e48ccdd91e31c09c068f1
-
Filesize
6KB
MD5c4116e16079c47573215bf2cd00297eb
SHA17e4eae4612bc5506b5101a6434d1063f14664cc5
SHA25682012538beda5ff66cfa24003ed8796146c8a432bd93219769ce48a1f2978717
SHA512cc5a75171a017e5366957daf386e942cfce19ab8005434d481d294fe3515436bc91b7901f85b830338c2024a5cbf7431d6d4a31fe8e87e23f6e8ce00f23957fe
-
Filesize
6KB
MD525c7b2341faffb25f649d27f2e956722
SHA1fc78263bfb6f924db48d995e957c903a66232566
SHA256cb4e0dbeb732c2ebb3cbdf0efbb9a9c8618d04fdf7ea9fe087d9d05c4e60d2f3
SHA512f4e0af0f307d9fcc0bd058e0abeaebbe79e6bce85a5c6e05d6636aac80318253c15ac10c3ff6227e14560e681e57dbcb56acbf1957f2aeae299e8c8d97c60f0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd