Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 01:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email-authenticator.com
Resource
win10v2004-20231023-en
General
-
Target
https://email-authenticator.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133443987438555798" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 464 chrome.exe 464 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4728 464 chrome.exe 43 PID 464 wrote to memory of 4728 464 chrome.exe 43 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 3800 464 chrome.exe 90 PID 464 wrote to memory of 1980 464 chrome.exe 91 PID 464 wrote to memory of 1980 464 chrome.exe 91 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92 PID 464 wrote to memory of 2812 464 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://email-authenticator.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff241a9758,0x7fff241a9768,0x7fff241a97782⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:22⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4984 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3920 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4856 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 --field-trial-handle=1880,i,13002406097444232103,7887800095034938829,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD561c21b8506dbd455d66c56154f4d3a65
SHA15dcc3041c89ba7d332bb4aae8560d25919544558
SHA256a8c530d5eedd7812694c072825ce56e9c7e9c1cd50a55b0e263dfa2725571966
SHA512187866f0b2e9a957cb9e447826c9961715c5fa598842b273e923f7e4870c3c84c02d7355efa75e934fcf0c130a3e531b9a217d76e0c908042246e89baf378b61
-
Filesize
2KB
MD5d2d1d0585fe5e1456b151bd4e33e1a38
SHA1771cf1957a36c5c2c268bc266a8286c4b854881c
SHA256858a88fcaad83419cd206d22e51bb461c1e71b8e1d3254b88bdb11fcaae9a21f
SHA512df91cb73e8ad1d9f476cfad7cb49bf789c2dd3905dd7c9cd165c2aa785ac21ca7b8a876eec1dca20ac1f883001c9920bb4bc5bc8aa2233cac4780db6e71052d4
-
Filesize
6KB
MD55ba2bebd6fbc0525a57abca59ec81b2d
SHA1854cb82a90ebd73672d17a5375c96f59760fc147
SHA256a6729c86ad6ca66decec943d6454d8c35573221166460868641241bfdfdfab80
SHA512b87b44e020f27e145ab8b45aa8a27e1b9dbc5a790d5e9ebc7330ba9f9ed8f25147d3cdcb8cb2b982dbdc2da44e2fae573d11adce22183aeb4adbc5c756379645
-
Filesize
109KB
MD557e073eb667efb7b6befaf2329f7ceb9
SHA1a48a0e3351cd9a840f1ae6885d9d80b312b06b14
SHA256ff6f2155de0a592fa11a51a91dbeca1540168ff9d4c64f698d5d2dccfad60f82
SHA512351360e42930e58d00a25e636d3ab0949c86425dc0a8da7cd69f547d7f5cc7e25b54bc6fe6765a086f27d90948e68519339c80c9d4bb4d3c99476af7fc0a10c8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd