Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 15:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://svb.auditboardapp.com/api/v1/sso/saml/login?redirectSso=true
Resource
win10v2004-20231023-en
General
-
Target
https://svb.auditboardapp.com/api/v1/sso/saml/login?redirectSso=true
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446236386863811" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2188 2556 chrome.exe 86 PID 2556 wrote to memory of 2188 2556 chrome.exe 86 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 4816 2556 chrome.exe 88 PID 2556 wrote to memory of 3900 2556 chrome.exe 89 PID 2556 wrote to memory of 3900 2556 chrome.exe 89 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90 PID 2556 wrote to memory of 2008 2556 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://svb.auditboardapp.com/api/v1/sso/saml/login?redirectSso=true1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85f2f9758,0x7ff85f2f9768,0x7ff85f2f97782⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:22⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4604 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4768 --field-trial-handle=1836,i,1638221831162919974,16264446731879435154,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534B
MD5b4bf4d0e0de41900b636ef7569ce5897
SHA162f36bbe5f5aaca1fa3d3b865626d8902c35422a
SHA25650d27418ea35694e9d71c0c784bd43c336af3376328c6c4b89126fb22868516f
SHA512e861cf2212ac46e86e3f0305d6a6c2e67cd92e43ea0ece92736e1227e913e091895d5ce44467d0e63e10da3aa322c3740698270637b5b3be5ca7a695f467addc
-
Filesize
5KB
MD51fc364854570e0e0a20aeba393671f34
SHA18de92894efcf121699ce70f8e523d8062f246f8c
SHA2563e4dc29e7179ee29b66655bd1bd6a75eae1aec06332e4b487c7ed92b0e7fbc52
SHA512cb59f33ad586f2faffafa6be0929d2ec9e6a3c740e69ad61dccd9c6e4918e7c06308e73f7e4cd2e517c4e348182f5636e07b0ba62f78085d3d6404394f24d51d
-
Filesize
109KB
MD5f5ec515cbb306ccb9fe58ffbd57288cb
SHA1fcad62d90d902be015349273696191d9a2320902
SHA256f5418ef487c7609fd223556a3035961492a657ff0097c0c27e5f8bdcccf75435
SHA51290220fcaaf6c7903fec5eac467770f76b3411adda31d75bb047ef664d8ba6f8d5b389ec7a89ce35e5cbfc9ae45e2ae6463f0157634017fc641f5b6e2af74635d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd