Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 11:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://servicenow.business-services.org/ab1ec5a1cb9e326d?l=34
Resource
win10v2004-20231025-en
General
-
Target
https://servicenow.business-services.org/ab1ec5a1cb9e326d?l=34
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133452114080666294" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4224 chrome.exe 4224 chrome.exe 3232 chrome.exe 3232 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4224 chrome.exe 4224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2792 4224 chrome.exe 57 PID 4224 wrote to memory of 2792 4224 chrome.exe 57 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 2000 4224 chrome.exe 89 PID 4224 wrote to memory of 208 4224 chrome.exe 91 PID 4224 wrote to memory of 208 4224 chrome.exe 91 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90 PID 4224 wrote to memory of 2656 4224 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://servicenow.business-services.org/ab1ec5a1cb9e326d?l=341⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffedfe49758,0x7ffedfe49768,0x7ffedfe497782⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4628 --field-trial-handle=1892,i,17238196696051275841,6729880812418957256,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD51d58cce215c1f853d95af5c663752fb9
SHA1c648be2cf90f5e6082f62983f87339461064aea1
SHA256fb9aaf085d32e0ead449d3c8734df266ac63689caff4cb0895e6b8bdabd5bd33
SHA5129b65c9555c139ed94f0c39bc86ac5de14e5f6d608f4991d14c2418855de094245ea005aa1557323d3c6a8739ef790e6e85e3b8af5ff65f4d0a64cbe44441a8dd
-
Filesize
1KB
MD533b6d7a8709b9fcf83ac7368f8e5e5d3
SHA1a22429623e7baa6c72204e95804dc33b10591e0a
SHA25698a8865cc86d3063d9f7ac390b2efd4545740563d84650ba261ecb0dbbb00cb4
SHA512568dd98f058334d62d7954dd7ae377048cacb2cb01b605222bfb1165cfe5adc8463826dc0de33d6af53f1aa893952bdd597b0d11924cd46b3888eeb542d1b89d
-
Filesize
1KB
MD53af9b78a0d8fe3ffb412607f6351eb86
SHA1cb4d7d439a14cb9f2a9573c527b7970de0cd3906
SHA256b22cd4817c37bdacc2625c2e3d180457775e70495ed8c8aa173cd0c0d2df2673
SHA5122cdf35560ea2c1a8a44026068a36ad5d197773e65af0da4e4b134706b5e9abd6f045e2e4a083c024db39a410e091c589b75f415d54b4a4495a33b9ad97d02aa9
-
Filesize
6KB
MD59f313730774b33cd403406b05730f4c4
SHA1cb20753749d88e9ea664c3557c22dab96f837ce9
SHA25631b928a52e50b7625045f6abd8bd04d2b38d76dce29026eda3e638151b04a5b1
SHA512d701b736ebc4a579a7b700c26215cd1022c4573829e7d4f5bec53f45d3ed076fcf6a83a854de85fb182fe4c036e02854013477bf002c848b2f758d1e17db8a56
-
Filesize
6KB
MD5a5f3c9e07db52602f29eb30470e3b6f1
SHA1b8a80b7d91650d441bee6b772ff8c1c9203a0b3a
SHA2561bbc72cb46052060883b83e40a366c81262c86d5eaa5fce44fe03273ebde7e28
SHA512978734e5a8daee6c909e91ed0d1583a37a39e9e244283b4bf22a8270af574a263b578d1fb23732d073a94eb40c3a9368992de9872676e81ced377fe8382ed3b5
-
Filesize
215KB
MD57563e71532743e35e187d9ff766d1a54
SHA19726d968dfe6c37963884611e4af5f1b8eb13e79
SHA256f6501ac0a9f3a344737627a26e680a7f7453ea180d7f50a8aadefe60899dc53d
SHA5128dccce82f0ae0f02f9c404f8f029a1a02dbfb834316c9f284eb1fa7d2807706f33e4fe3131ce4db81163fa13025cf83daa95a852d6ff8ca51b99e2e102cd5668
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd