Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2023 11:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://arc.msn.com/v4/api/selection?placement=88000452&country=CO&locale=es-CO&nct=1&OPSYS=WIN10&browser=2&ofc_flights=iris-commercial-bizbar;&outlook_branch=default&asid=7bec949f-7a78-4352-7b0f-7e59e66f632d&outlookpremiumstatus=
Resource
win10v2004-20231023-en
General
-
Target
https://arc.msn.com/v4/api/selection?placement=88000452&country=CO&locale=es-CO&nct=1&OPSYS=WIN10&browser=2&ofc_flights=iris-commercial-bizbar;&outlook_branch=default&asid=7bec949f-7a78-4352-7b0f-7e59e66f632d&outlookpremiumstatus=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453000794852720" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3216 chrome.exe 3216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3216 chrome.exe 3216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3032 3216 chrome.exe 84 PID 3216 wrote to memory of 3032 3216 chrome.exe 84 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 832 3216 chrome.exe 88 PID 3216 wrote to memory of 264 3216 chrome.exe 89 PID 3216 wrote to memory of 264 3216 chrome.exe 89 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90 PID 3216 wrote to memory of 3116 3216 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://arc.msn.com/v4/api/selection?placement=88000452&country=CO&locale=es-CO&nct=1&OPSYS=WIN10&browser=2&ofc_flights=iris-commercial-bizbar;&outlook_branch=default&asid=7bec949f-7a78-4352-7b0f-7e59e66f632d&outlookpremiumstatus=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa3e99758,0x7fffa3e99768,0x7fffa3e997782⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:22⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:82⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4396 --field-trial-handle=1884,i,16955075168772188041,7324115873000191601,131072 /prefetch:22⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697B
MD5871e3b89132e095407ee53371dfa4400
SHA1fd3a5f4ee111a96afaeee77e1abf4d672b6899f2
SHA256c914bd1725b49fdb1c1ae5055e3ec0c2b3a7b5cae542eaf38bfcc097787848b3
SHA51241b8e88bfe2bb27783c4bad5d7de192de9ed0f79da4919bf4e8f806adabf48fe5545cea28612a5675019b712ac305e1db58c840373ee458cbf78d35d81693714
-
Filesize
371B
MD507cf058451e209af602cf087582f76a7
SHA19cd04d68284b1bf933fde0933a6b522d63f13485
SHA2568c010f739439dd6f87d5185ac7737dac319699b8f3a0bec8c7e40b68122050f2
SHA512987da59efe09e5655109bc5d685b563a77e225514f9a9f996d25da605f38567116be7e129eda0f9ee9b4a47cf4c5cdd947e1894f82121d30e2ebe457b3078908
-
Filesize
6KB
MD52cddfe285b5b62607541da5223f4f4ba
SHA1835f27e1ff4334f4da3c591fc9f0deb03e9605d6
SHA2568f21812c89763c91d3bef4dc22927be75f99196d7adf5691c75608975cd2a884
SHA512075b7728160db21efafcb6916a9bbe57fd9b12d4f99e587844b948a364121f6ffa8a8e38c717b71d34fb5d592b73dd42a4a77ef24f8a7e68af6647a2b9e37587
-
Filesize
6KB
MD58487309ce486cb0c0f6f5d732a378aa5
SHA1fd83ecacb39083b1f1fc2d0198c11320e20606c7
SHA2564917ee133a514b2b52d078d7379503e37a2be9126988a3c95fe802c337d40c57
SHA512b99ec3a6cf72f990c669d0e68cb67815f6933755bc16459d3dbb5a7461a5a1a960e2403ca91bea6d3c18419274971f078289967082f3e47b8c62c234252924e5
-
Filesize
6KB
MD53e7abe508680d13f74bd3d12d18dd311
SHA10a181956e232ea0582cdeb11e316d71b01a343f6
SHA256979c8443acab36b5c54c058136f2726d3fc8e34fa2d40ab324a44bbb195beae9
SHA5124147fdee8c7fabba071363e913412511b338621a3bdcfb4db675fe04199db94b32df747883a74adf1adfd2df252ce6d9c1751f86a57c299ba58e15768fe51d6e
-
Filesize
109KB
MD53144bf02bef65bb073cdeb1d82b82dd6
SHA172f5872c6b8f5cfcb2fbb658bc3788ff0bf8fbd7
SHA256c1d35f0c01a486c9fcbcf4fceb83f182b69d595be8eb69c3a00cdbef9904a4f8
SHA512b02b0d9af9a0071bb2fe405661b18749a82185af853efc89a5263cd2422b64ed30b22e8e663ffb464cd1b8257b6ff8bff6fe88af538351cbffffb3bd012b39ac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd