Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
22/11/2023, 06:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hec.az1.qualtrics.com/CP/Graphic.php?IM=IM_8oPDCRsYF74QAbe]
Resource
win10-20231025-en
General
-
Target
https://hec.az1.qualtrics.com/CP/Graphic.php?IM=IM_8oPDCRsYF74QAbe]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133451094485801036" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 3556 chrome.exe 3556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1200 4176 chrome.exe 71 PID 4176 wrote to memory of 1200 4176 chrome.exe 71 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 3820 4176 chrome.exe 75 PID 4176 wrote to memory of 4500 4176 chrome.exe 73 PID 4176 wrote to memory of 4500 4176 chrome.exe 73 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74 PID 4176 wrote to memory of 3060 4176 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hec.az1.qualtrics.com/CP/Graphic.php?IM=IM_8oPDCRsYF74QAbe]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff62139758,0x7fff62139768,0x7fff621397782⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:22⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:12⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=164 --field-trial-handle=1784,i,1481945018773809280,8440591281198737983,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58fd6b72431cdcd56cd3378286e598e85
SHA1d52442d0d5c0f57de16c7ffb92248739192590e6
SHA256dae6a1051923e80e734f71e5ea297de32009d4acd9f362645c5483a079daddb6
SHA51205e2a4705dfd368b0e9ed8d54ab2a66babd5f7952e9d94c5773ffb06538e232fd1992c72ef1534de31db2ab42c9b5f53f1cd91f74ccb6eb753513be456777569
-
Filesize
538B
MD540ceae0888161c362a9bfabc1048b5da
SHA16fb8113f37127c4a035e7b3778cc43f6c529a92f
SHA25667fcd569682aab67998fce577e7ee1d365be8509b297eed7fa69d06992dffc2c
SHA5126036aea2cb8005bd67cefdbac116441b9a2ebe785ad7f3ee154378b957c7399d71615f5791914b9fc69e6d35869b20f8e59e3bb4105489279254742f402abd53
-
Filesize
5KB
MD56066607d71df36bd46479024d7ede4dd
SHA160f66c572d8c0eefbd44537546876325dcb8d04e
SHA256f300fdc32f1e87e312fb9ab909137c57c75b4b14c136c5595e558dea5cc36463
SHA5126534cc16c20241d2c9cae4b80a052b147b4583510f9ae457a3348010812c4cc1d714d711ad356f68c5dc315e49c702d0c190aac8580785118a1718b08a435d40
-
Filesize
6KB
MD5dac7b2f692b131805e60d128080503bc
SHA10f73736c5c651a990114627e353c47e70eefc12e
SHA25641f3dbe8e07005906c7aad15c6753b604a83d1df9e1e3c14b5a14e3a53c42708
SHA5129e2eb2c130ab0a3160b049211524ebf009a240228c01b1107205b09cce582bcb7818fd0e86635f8c9cc14b324b67d5f47f69f5cbe385fd1641b1322ecc9f82ec
-
Filesize
5KB
MD572fadf9def12c402e4d021077c80b158
SHA17ee0420c83a31b1432f5977397e87ed80757b5f3
SHA2566a41448c80c36e46132ca67f99f7a84985a5682fae761818b9e5957d18d8bf93
SHA5126c8b0c0989382d9aa9046cbe46967fc933ec5950b1e94eb245b05abcaf108dc68b32674e7ff4f0634fb068a9a4752c613efebdd80173ed8eb7e156757c8c3919
-
Filesize
109KB
MD521278661e470e7d0f0d972147bde46aa
SHA105dd7759b6a5286b09a43ffe273f9189a0ed57c5
SHA256e37ffbb5171a5a1608a647c243d1f6639e3a33ed7e6452cf14406fc1e689f92f
SHA5128babdc73f4c83d1b9d7fbab93ae7d312bd28f659e9bba4b362a99f54276f332a32856f0c1c0a444c60db6c881c7113f523b5746cd979d8f7497c87bb3355f0ec
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd