Analysis
-
max time kernel
300s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 20:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.chase.com/web/auth/nav?navKey=requestManageBeneficiaries
Resource
win10v2004-20231025-en
General
-
Target
https://secure.chase.com/web/auth/nav?navKey=requestManageBeneficiaries
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446400299480135" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2092 4628 chrome.exe 86 PID 4628 wrote to memory of 2092 4628 chrome.exe 86 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 180 4628 chrome.exe 88 PID 4628 wrote to memory of 1484 4628 chrome.exe 90 PID 4628 wrote to memory of 1484 4628 chrome.exe 90 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89 PID 4628 wrote to memory of 2440 4628 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secure.chase.com/web/auth/nav?navKey=requestManageBeneficiaries1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa9a279758,0x7ffa9a279768,0x7ffa9a2797782⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:22⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=984 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1864,i,2876042560857252348,2242821759814819765,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5717e92d59ca28207d4a1b4d9fefcaf36
SHA1b0bdc07ab4b75cdc3d1db4535c42ccdcd6247c71
SHA256ee13ba9d3e4e59d0c00e5e492fe48c4c43c1950612726301e620ed91dcf412e5
SHA51248b2444fcf879bdfcf98ec0cb933bc00cfe2b9285d0ea3ce2464245082fad85cde39a768255a12683ac80e2c02f70bb3609aae2e63b86affbbd08e6855180d07
-
Filesize
456B
MD596ad5222bec73c0a8649898c71b68989
SHA1e63bab729a93120c762e3a64f342def5eb4015ca
SHA25678287b2aeea53a34cad5997c6a0063df1a45d69ec61774657bdd12ae4a97185d
SHA5126193a704f28520da97ef7b2f032934766f0f8c81b8b59db4c741372acb6f1273b24f3440e12590c32efde0b8ea6d5156745a5f2a6368791cac38670bd6d8441c
-
Filesize
2KB
MD54acddf2d7e0b85fc24bb8330a791f7b2
SHA14b660a4d371a2442cc8288a5b379a90e6de6ca11
SHA256029e0ba3900b6262632b12b2ade0dd36ab7552d5d210a28db1015e5c55b42ebf
SHA5124deeb21fab9fa2bdfbcd88e35e31554a1b528746f5d197f057df8db5b2cfe97a050b5736dd0142e06dcf8c71f3f5f9de9e4127c49fc90d235bcbff82921c9dd9
-
Filesize
1KB
MD552b72c2dd3e7c07c37ebe2258980fc3f
SHA1da39d6f5f48d5fefc2273ea36db04318e74835c5
SHA25652f3c75fa6908aaf903f845e6404de00005eef2647746c169186019df5ed7711
SHA512b17fe103a8950cf00963fddb39b26e4e60c2df3787fa63f957e6879c8cbad4b60927fbef88b6888de7a837e13118872e21f62d2e56d64f18525e48509b313a16
-
Filesize
1KB
MD526ab99d61791619ee28a5beaf92fd6cf
SHA1c3caf01c4153fdc67c86dbde1388a33e7f875e52
SHA2569204fb9edaacb3080693a6d7ac5e5f4c6275606edd4d78983751b59f0308c7e5
SHA512ebf7a3a301b6924979545d78d9984ebb9c2589a98c535975f5078923f902983fa518781bfda305413363fe4d56d56964f6750d15805fa8a59b4f3100569d9be0
-
Filesize
1KB
MD50130215d1335ff70a5125a2cfd010edf
SHA17b47e68c669728c00361d6343e337b9eda82a463
SHA256c6865f63d647c7f2bd13a65a201de9fdf37b3b2eb3cc7413e14e4d7452cd3009
SHA512e53665a3775123905291833af879daa4d9a63219a40b58f7f474a7c9c6a98671e50245d07fa64ec28f6b78134399853fc8a1d14fb01b6575aaa1bde9cd331778
-
Filesize
1KB
MD54ccbe164cc1de7df37b571f2a56b573f
SHA1314a3b658e8c10cf87a139260a89935fc42471a5
SHA2560106f4cb00ce9ae4d322a8ab5bb9f64cd3070e4d03bd58e0f69a8ec1f3b82168
SHA512a5194b73c82a892eede588ce235ce34138e053c954b8a1eb3a49bc1cb76c56a82922ffbe6735d8ff46655eb79f59b1c8651096e06cf13317d2e12205e5737a57
-
Filesize
1KB
MD58be400cdfbf806afb4f036e77e745561
SHA11054d788cafcfb701f3096aae4bd4d41f95740a1
SHA2562994da6585829c145d13d329ad453cc9ef2f20eab6fd98a193aaedbd9da1f116
SHA51242928ebd6d71c79c7a19d19c16913243c142ed85dadf3799931692fa16828625ba010bc3b7907f1800cda973886dd08af0d525594a9fec14d47ca8420e69c046
-
Filesize
1KB
MD5f69b84a4e77691ece8c32c38161a5160
SHA15a215002a26ee2e92ce87436739b991475f1625a
SHA2560863498f0bad56b4e7d6602222f93e68e0dea98a67b08c08994001a1e047d2a7
SHA51244c780fc6d4b52c920f14a59d998884ae085de110ae9351f1da3540ebf0166781e5ae0d1bea291842d6cda63163603a24bc7cd0d6eda10ec04f72b92a7b23c82
-
Filesize
6KB
MD57f865ce6b95a0d98b77f5a66ddc46fa4
SHA1caf1c012873bfadfe33cbf8314058340feb7b087
SHA25646fdbf416c900a6257475cab5b8fcaab882a8204d5133c18091c35c9815ba6d3
SHA5126132588d96cc6d8fc3cb69ba198de6c6e0f7eb5fe51df996a340a257a32cdbc37a0d21784b2024f4a2c32304bc0b2597234ad01918eb11a87d9736ed8bd20efd
-
Filesize
109KB
MD537a2baa7463910991f9f0dc92a014412
SHA11c5036cb91ea25097ff68ab13f9a9fdad9684442
SHA25626cb83247d7672ae72c3806657856abbb52f49689297073010a9ad3509f823f4
SHA5124508b9e39039334b8719dcab498d823db9aa519eb53c2df517fbb86f913179d5625611d7bc7d23d26904629fe3edd8fe5c291055d86c4b2dd8f7fd487f26c13a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd