Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
19/11/2023, 10:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://smtp7.sjc1.qemailserver.com
Resource
win10-20231020-en
General
-
Target
http://smtp7.sjc1.qemailserver.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448636322820147" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1488 2504 chrome.exe 71 PID 2504 wrote to memory of 1488 2504 chrome.exe 71 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 4492 2504 chrome.exe 77 PID 2504 wrote to memory of 2716 2504 chrome.exe 74 PID 2504 wrote to memory of 2716 2504 chrome.exe 74 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73 PID 2504 wrote to memory of 4388 2504 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://smtp7.sjc1.qemailserver.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd84009758,0x7ffd84009768,0x7ffd840097782⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1576 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2608 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2600 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4492 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3008 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3568 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4440 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3292 --field-trial-handle=1844,i,8769273693712946804,12880177916412753073,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD516efe4e4bfee31c0e0f2fe5686689f22
SHA1b9768baa89d8a63c09cdb23c51a84f21ae2e6bab
SHA256cd7197f928feea4d52393398fd8e8a6ebb07ed4de8d38b86fb9a2216bf01d221
SHA51290daaa3d3159661aad5424969d57dff77fb7d36ada0934f4e8719f03480b0cd1aa8111a8056eac0b5f363753554bf0df73ee0cfc2c2beecdfca94b4912b566e4
-
Filesize
5KB
MD56aa064a0ccc962bea1432a5ae1ac83ae
SHA1a273ebfa96a4b68a01053e1c0fe775e66b8125c7
SHA25668d319268edcf8f67d0f1b7dcad31d4b2b2b143f0a611af67acce6aa08702704
SHA5128d1d955a4ff71fd98d77479f47738ba0b563a10f1874e24b998b570df532855caa91ddac9e7ccdb3ea844d570e9e88769ae3be684e6cea3c76a7379b5a4eeffb
-
Filesize
5KB
MD5a8bf69329c3b17ac60de958fefc26357
SHA1bfebeca1edbfc3f211680a0291b4440ba0f75edb
SHA256f391475ded82b70e24fd9da1fa641d92da68888b3059dd0ab295698c782df852
SHA512c65fcfeed497d15e5b3f26a9f2054828e421ddaac80bd7d83d688bc0b51bfa1de6b5f567027211252d180754318e7f49d9a377fbda1b4d00631e5c15cd75b694
-
Filesize
109KB
MD58d49121cd34d8dc10b3e1ccd7e08e866
SHA168946f564ce43314c1e06ee0f18c2795fa45a3cb
SHA2560705ae879f617aacc8c0bf372da92ad969b1cd0b925edcf3e8b82dd06a623072
SHA5125acd989967765652dac6823d064a316d1cb8ebbbef503d05d2ee18e988a1f42a3683781d39de1b9a53a46729856f2884fa96f17c60753c440f3a6d646a7f34dc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd