Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 08:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://centralapp.accessgme.com
Resource
win10v2004-20231023-en
General
-
Target
http://centralapp.accessgme.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445109217956960" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3700 chrome.exe 3700 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe Token: SeShutdownPrivilege 3700 chrome.exe Token: SeCreatePagefilePrivilege 3700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4852 3700 chrome.exe 62 PID 3700 wrote to memory of 4852 3700 chrome.exe 62 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 4308 3700 chrome.exe 89 PID 3700 wrote to memory of 116 3700 chrome.exe 90 PID 3700 wrote to memory of 116 3700 chrome.exe 90 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93 PID 3700 wrote to memory of 1996 3700 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://centralapp.accessgme.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe9d29758,0x7ffbe9d29768,0x7ffbe9d297782⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:22⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4816 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2492 --field-trial-handle=1864,i,1400292630138868334,10642620706646371078,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD534114982ae91d6dd462c04ae4f1ccda7
SHA101f39a4232ed8eb15bba3c524016d3fd0e5a1406
SHA256e9e447fea6df6ecead3b4a4394191eb36a72c6312be6d5b75329c4adbdbfc21b
SHA5121138c2d52ad9a787e30b2e7646458779e462171747513a53c9e321f45bb6599c13ecf874fe4a141ccd2f6ed2600b8534eac1593eca066835d29a4d2fb8cb4be1
-
Filesize
1KB
MD585317f307daf2810e5ffeb350f2c3bbf
SHA13cb6089739d03055a303c03b899d334450217a04
SHA256e977aa146d5251e46c97f26e5214ce4f4b8d2135e7bda790d4e971f9d7f6c600
SHA5120308f663a7572c4dc14a907052cb55fc4cd601cb2b9bc2a212376543bbfafe24a9dbc12af0fc0d611caeec8ec035a404f133aa7260103d7d12faf36eb63b7daf
-
Filesize
1KB
MD57cdb51ab175d89163f304128ab4c06bb
SHA1a3ff19cbf70c8f4b5d92ceb599a4fec6437b8c9f
SHA256de22b87610f82e54a34684d31ac08a6a0e7ce92f879fd4f86cd77e04fa403b2c
SHA51244e5cdaa004e3361ff5158beb2c1e60b79a49e551e5cbf30d2e73e1db5557088e27e52fb684c1dfca29e590c90a88ee3c2c62a1d543cb861a49817151e5bf90d
-
Filesize
6KB
MD50a59b5e3b648959b128b81eea8fd0e76
SHA189d8576c3e245d184d5d44c884b5a0733432bd28
SHA256165134b63919c8742637dcfceb91f92e8024d135a2cb766401e5c8a10f9fdbfb
SHA512b95fa6d0fdc89cf2b094908686488774d0529d3bdd465fef76900f4fa0b546c58134b8f5ba3474e311b7922da5271b74fc36efe008dbbbfd0473e87fb876cc2d
-
Filesize
109KB
MD560fa09dd8b652100f20cefeb4a2bdebd
SHA10988a295726c5eca16bb63540ff62519567694b1
SHA2561ee2901b16abd65b1b723369fb43b1e5e3c289fa58a71015de077beeeff55c5b
SHA5127864938c869c6bafed39b26c373b730806e0d91aa5d44a469e0cd177af5430bce7ec1a70c574a98f07d6185392e7fdec9475dc8857b5d63696710cdd6644d60f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd