Analysis
-
max time kernel
599s -
max time network
493s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2023 00:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mcresearch2.co1.qualtrics.com/jfe/form/SV_1FvfxnLDNhyy44Z?Q_DL=upytPbYP6qmRHk4_1FvfxnLDNhyy44Z_CGC_ztur3Vx8tFXxF50&Q_CHL=email&qinc=10
Resource
win10v2004-20231127-en
General
-
Target
https://mcresearch2.co1.qualtrics.com/jfe/form/SV_1FvfxnLDNhyy44Z?Q_DL=upytPbYP6qmRHk4_1FvfxnLDNhyy44Z_CGC_ztur3Vx8tFXxF50&Q_CHL=email&qinc=10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3028534956-1709433221-1313273668-1000\{3E9E0C76-73AA-4D00-A0BC-FA9AF4655314} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 1656 3536 chrome.exe 75 PID 3536 wrote to memory of 1656 3536 chrome.exe 75 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 248 3536 chrome.exe 88 PID 3536 wrote to memory of 3140 3536 chrome.exe 89 PID 3536 wrote to memory of 3140 3536 chrome.exe 89 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90 PID 3536 wrote to memory of 4964 3536 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mcresearch2.co1.qualtrics.com/jfe/form/SV_1FvfxnLDNhyy44Z?Q_DL=upytPbYP6qmRHk4_1FvfxnLDNhyy44Z_CGC_ztur3Vx8tFXxF50&Q_CHL=email&qinc=101⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff22389758,0x7fff22389768,0x7fff223897782⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:22⤵PID:248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4928 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4936 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵
- Modifies registry class
PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2560 --field-trial-handle=1700,i,15571676165015126968,12184911237187551709,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x2f41⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
312B
MD5a9b221067f2ac3d92415fea32e040f43
SHA127f435d90d4dc67336c2123ee6e149de4bcf0940
SHA25682052607dff6e36271ac0194b0889e4e842b5ee1ce399d78ca676e7566a57fcd
SHA512b5e618f57701852574812b6c0a62780dca1ae8e909b57731946eda61edf8cc21d164624e239b4e93e980ac8c14665acb71bb6db90987a56f4f29fcf421475c68
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5575a482f4aef3b2c4c07dc115750ba75
SHA1fb2ceae001c9f62150558b30d5ff9a561bf112de
SHA256243c182847df477769be392ab21e257ebcff9d6328cb51e57b5fda4e04e574ec
SHA512a65faa62a820111e93a170e83db22fce4a0170f15b36a4edbf42016935224af4ae7338ad21ddf371edea80e92c085d8e6641d363b8af1c5b9e7f1af18ae55d32
-
Filesize
536B
MD568a8925306205cd380d6b046a8b8fb67
SHA178d55a189cf11898bf12a3aded2a065f302fd9f7
SHA256a285c4bc5ee9aae1db4f75852db5c254f94d82cbc22f666ec298d20d7547b076
SHA51299bb0d7cdda4e85f23c55c4557180cf22bdd8a386f52f29932dd77427f7a67a13d5f3cce46fc9c43ee7484d51fee0d259af01cfb2496d860f98fbf3ebca9f31d
-
Filesize
6KB
MD56c3dd5efbc32578fcb826bf709973905
SHA1bd0dc0fdec91ac111d2a98418728655b2f446fed
SHA256adcac74fd95d1b6af6ebe16a613220d1ec8765d377bffe9408d0183a9e184693
SHA5120e83f70cf3149d929e285d6896c7d6540f1eef653219e74c6b6a4b187c3da0ca59960933c35cc4929fd5d0913448cf8111ce724df3850fae0f840b4ea7183373
-
Filesize
115KB
MD56cc20dd6e76a51dc7840e302bf332b82
SHA1360eb006796088e678d98b6d9379db166097a84d
SHA2563340895ba27d16aea9c49c9b325098362700c52e65181fa75392e9ba779af208
SHA512052f5692b5c3e6c2eef2c3721f76794c2017f263b1d556c54f2ebd0a96e98f5f5c340b3979a672c5380e5ec757915b4bb5a9489eb32b7f2d7fe26f36201cb0c4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd