Analysis
-
max time kernel
300s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 21:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://form.trustmary.com/35NuOJt05
Resource
win10v2004-20231023-en
General
-
Target
https://form.trustmary.com/35NuOJt05
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450747246881628" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeCreatePagefilePrivilege 2880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3148 2880 chrome.exe 85 PID 2880 wrote to memory of 3148 2880 chrome.exe 85 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2328 2880 chrome.exe 88 PID 2880 wrote to memory of 2824 2880 chrome.exe 89 PID 2880 wrote to memory of 2824 2880 chrome.exe 89 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90 PID 2880 wrote to memory of 1636 2880 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://form.trustmary.com/35NuOJt051⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe55f19758,0x7ffe55f19768,0x7ffe55f197782⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:22⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3572 --field-trial-handle=1880,i,16184829250750494357,3646906179884328618,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD52ea18f2156662a55fa366177ca0dfdfe
SHA17618a6047c4a97c965f623c4d56322d1d39440a6
SHA256753ebc3355b0adf4750357fd738b3ca00c24c67c95c820537d375df01ce5bcd6
SHA5121b930fcf8ad8e163074499c679b2a9aff22ed8f9a4f38726615039dea37e08ac8287fe6b97a50e76a22a585ee7f94d30b123f59f14ebb6c149875476c39169b4
-
Filesize
2KB
MD54194bbd7baa618c1134f271ad5fcd27f
SHA1bff6d1f866902f4ae68b5cac2583a0f37de9b3ae
SHA2564075b22a79935ae48a139676b290ccbb473865cfe40523e50643d542595a802c
SHA512e3c151a24cfb09b42de87efb3cc16c69c185c083ab231790855e82f9f1d2034d7f7d225a211fd6829f08989e1821d6cb4269339a8470d03e1b99e98c229788d0
-
Filesize
705B
MD57ef4255adb4cb103dfeff05985de685c
SHA11eb1c1cbe5ab8342fe02318c0a49dfb0292c9034
SHA25672d1bdd19a3abd9e012e199d93c237539068d180f9255beddc95713b2282f2a0
SHA512d22ee32025be74a3a741c8e60c732121febe3aa6c3d606951d5cb2fce3acad40114df8e3c0ffff537fc840d84f4893287fd60e47eeacfe625c7670c02d9dba48
-
Filesize
6KB
MD559bbbca0a00307f4148e97b05b711e2c
SHA17121ecad216216ca958344ae4052caf317ace641
SHA256b99e3e70ac1913c6db48ce07115d9284ace7bcfdb6b3e98ba7251cd37f7229a1
SHA512d26041c581b5e9d944942add0d03655d09ac579bcf24cd09409eb4204c66651ed9451f3a25a352419516bef038fa6726d5f545f0d39195c7259d2f8582fc0d18
-
Filesize
6KB
MD561f49a507afbd5449f112db59ece57a9
SHA10598c3df249867180de94069829be5780ab8f326
SHA256d0d4b8126a3890e8151947b2c361ecfb3a7e66dd329ac90013e4f295d958caa8
SHA512c868bcd596c53ab5662cf4983a1e2dfcfd1338121fca415380c66d2ab00b31f48b0d462ca360ffc8d2f36a9c35ef768269a3cc4d19c0fddacb807033b28e9475
-
Filesize
6KB
MD5ea726d4497a3b988f6640e3f8d55821f
SHA1417a7b2ea2d8b6abcc9ea054c767d6e772c51dcb
SHA25623baf889552f40f2aee1c94701728e197721e1ba47564eb03747f00326f1dd4b
SHA51261fd1687d53567314fb564bf57e0c28087c5c77604a5d0b8990abbb6269307f762c56e85a5f1ce2057b6cdbef995c33935767f82d4ca046e6f00ab277fe96e3f
-
Filesize
109KB
MD58573616c6d7bb7725c0ac1994353bb06
SHA1d6e7ffa932588a4e85ddef5571b4e40072670d52
SHA256668713c37a04c83e549c0528f71d4eaf71e9424d1abf5cd46b50f5ba1e4abc75
SHA512defb81ad61e6be0d3f10180091b0025dba5514ea0f672f35c85ebe8da81fd8fa76983980c4ddeb792712abf6a71c132d6f9393cf173c4995ca40c56f56853e45
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd