Analysis
-
max time kernel
296s -
max time network
299s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2023 14:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-a91f898080cd4bacb5fb902bc053e5d5.r2.dev/adobemessage7.html
Resource
win11-20231128-en
General
-
Target
https://pub-a91f898080cd4bacb5fb902bc053e5d5.r2.dev/adobemessage7.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133464346354229586" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 964 chrome.exe 964 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 964 chrome.exe 964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 964 wrote to memory of 3648 964 chrome.exe chrome.exe PID 964 wrote to memory of 3648 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 412 964 chrome.exe chrome.exe PID 964 wrote to memory of 4728 964 chrome.exe chrome.exe PID 964 wrote to memory of 4728 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe PID 964 wrote to memory of 4072 964 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-a91f898080cd4bacb5fb902bc053e5d5.r2.dev/adobemessage7.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0xdc,0x118,0x7ffc09cb9758,0x7ffc09cb9768,0x7ffc09cb97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1848,i,18399173537806384333,7053864204281234200,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD54d206f37107528abf874d8978dd68748
SHA1f606dad78f3807e979c7da2d865c08e2e45a5103
SHA256832b76bc9a95b142f2f312e8b4d26bddfe6a573b68a9abda0a9db42e98d6bd08
SHA512b52b3a2b0019e33ddeb9cc5e3c87b25271e3e59167032d97c49ec0a3057810e0417c6b6d9c0b3aefaaf2902a7143b2ec2fb39f9ca6964f6f5208d0308adf9af6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD58738cafde1ccf470f5069c125a666ca7
SHA113aebf01acc77365f2e0ef80db006988dedcad44
SHA25643791dd15a9a542b49c6f1fbc6372c845cc9d086f4ff2b2e4270624ddc3e0f22
SHA512b3fa117002f12a093760c23c6266ad784506610b1cde1904d619a171ce28ea4cbc9d6f2f2ece215e5140b31709b6b3d4714682a07c6f1e1702db75a02d40f439
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
872B
MD5370bbd8cee60d50e71df3bc27c30b7df
SHA1d1f47ae44a90c8fd2cb91ab955f9ed5b1c689451
SHA256aaaec68d2309b3e4b146862ca4b125f556579e26747228ef68778a80fd308dcf
SHA512d9a4088a239afcc9ac212435f42995e227576a48704f80a7bdb22340a07a66aad164a83b6219370175d888ff57e99ffdf988ff8ccf606d5337a343f70e91d471
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD57a1e39cea4d62cf8403cf0381d041b2c
SHA1e6137cbdcd5a0edbe99495d3d8f195bb08dc1c27
SHA256ce8b4bf5d43006a7b1aee2a7041e11373cacab09b835f4f341b69e2050e46f51
SHA512e7feb692b02ae484b3cd0ef90d076f304276f166327046ae651f281039c38d0e5c4cc7d31291b81e488e6fb37eb2e27aac828f46d7da22f314537ea2f2633c73
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5629e57caf765758b91ac9934e684cf1e
SHA17a3757e553d4a4300dfa9800229471b7bf1aa2a8
SHA256d6740d5b0751707b2628c595d33d44097e4d431127520d4c00f7aa01b5902707
SHA5125135e93f0f52f6854d5920177ec54f4a237f77404016fbc9173925ed1e66358067e72575e2cf303a180281b53885e252675a305f57ed2a4976464145d1d8cbe4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
115KB
MD5bbaa1cb9449cbcddaf13d9cd2b3330e6
SHA123888a30bd30dd43e9ca422cb2fa1f71fed78ae5
SHA256760753ae2346963b032ed52091fca969df948862592c97933928a0a616eda29c
SHA512897f97d3592164e563ea9368c00bbd368c55de50746e2b4a628ec02f90ac920259ca35fb9ad2326722a2b9e299812372e61b88e15e3504375d833e1053a4f797
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
94KB
MD55feb72e9b0888dbad0591ef99d730a0f
SHA105204d9cd63e731efef590354d531fa4c75923f6
SHA256c09fed57ccba5f58574a912e86cebfd0ac46069cff525b7e07568c4df5331c19
SHA512f19d8a2303b3d03df900a64f5702f34affcab155b7a7b0c53bd93ee7322fd9277390280e110d14654650bbdabb49a14ecf90c794384cd29a44d12d0a509d137a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5b92f5.TMPFilesize
93KB
MD5d7e90e45bcd4d017bb71f4e0a5af9519
SHA1b2a0659b857d2e3102eda3ee1264f975122cb767
SHA2561732e66b9067760ea04f70f020a2f7be9385a422c22efc502d0f77500d422684
SHA5120fca70862b6bdd42ac86d4eca445dfd6a177fb978bfb63ba2013af1cf111a777373fa37d20cc8cad44ef5048494c7466016095ec7bae5087e458e20b6ca9a2d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84