Analysis
-
max time kernel
300s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 15:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://academics.one/go.utah.edu/cas.html
Resource
win10v2004-20231023-en
General
-
Target
https://academics.one/go.utah.edu/cas.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445356004969471" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4120 2856 chrome.exe 29 PID 2856 wrote to memory of 4120 2856 chrome.exe 29 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 1496 2856 chrome.exe 90 PID 2856 wrote to memory of 3224 2856 chrome.exe 92 PID 2856 wrote to memory of 3224 2856 chrome.exe 92 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91 PID 2856 wrote to memory of 1004 2856 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://academics.one/go.utah.edu/cas.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffedaa9758,0x7fffedaa9768,0x7fffedaa97782⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3984 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3336 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4116 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2564 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5136 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3840 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3920 --field-trial-handle=1856,i,9192320142317426086,14544175845413552643,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2376
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5649f33729dad2f1529114ac137ffcba2
SHA1eeeee237fe8ca685ce5ed62a4647871bff141fcd
SHA2563b21b02e416c97f2e557b40d8e9f1c318bdd49d5e5e18acd03a6b5165fe627f8
SHA5125a42f8f0aa6be74d86bdab24ad930c632fcd18eaf8c98b5446791e4905955208b8af873f293d516eb4f6b477c89585c9c8688eb0cf60108a941c8f42070bba47
-
Filesize
1KB
MD519c2650a4406970c846046f9bf12caed
SHA199dc5325f684b008df9e4b62e8d4d47a65ca073d
SHA2560b35c9063734e509bd136470fd678551477c135b36ca3b7c9186e7510cc4a6ae
SHA512f69fd8cfe3d9868a11a744eefff1e6be1b1d8a3b8122433059d625974cfbe16296f430d52cc9d00dc5091546b98816e3e8cce416f921549df760e9d833bed55c
-
Filesize
6KB
MD5f19f3ec8f4fd32021e10326bfafaf4bc
SHA1d3cc9f33c9d5c079b7f00b581d112ce876a785f2
SHA256b206e58a028452e8228e558959224d5b5d16c713cc801ae9d4fe11230512cd10
SHA5127ed9203571385e4ba28b6bcd01f64681660711bb307c8feea2212e98dcc451162a21ed37022448464654fedbb256cc2fd3b86f2d6e115c6706348ea4b5f705a0
-
Filesize
6KB
MD5ba18e753da762a77d19f0e0114c65ec4
SHA1eae9dc6adb02ddc622a1b7d5de8d09adf24de4dc
SHA256f36360253a801a60b41edc26704eb232229de4616546b9c56bbbda5751dc7d9c
SHA5124bdbb3c6c373fa519a0830e044608686c7df98918906fc6057d6c58a5fb95782daffcd0c0f404024e7c390329592da98404af3a85bc5a642a34f572a0bccd879
-
Filesize
109KB
MD5bb8be884d43b745222d07e9d67bb5e75
SHA1b9c32a7df397c737d143a840437667ed25c3f081
SHA25607cc023c5279cbe45966b5917a6a085a3fc146ffe433c91b10df46daeeed7906
SHA512cb67189923e3209b187df0bd467edae4ca99e43ef4ca7710b2f6205dcc884de6a5bbef30cdccfca7704de74a6e9d2b33fcc1a691dd12774ca138badd8ac7f0b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd