Analysis
-
max time kernel
1199s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 07:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://workday.zoom.us/meeting/attendee/tJIud-CgqTorG9wNMTERv_Ot-BoD6NUD0dAp/ics?user_id=_jLqSlA5qPxbf1Q024GiMgJ-Mq-4OQ3MfOwJX5fl1LQ2Tp7HUPs.ARZyqwKjnLeVJZh1&type=icalendar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://workday.zoom.us/meeting/attendee/tJIud-CgqTorG9wNMTERv_Ot-BoD6NUD0dAp/ics?user_id=_jLqSlA5qPxbf1Q024GiMgJ-Mq-4OQ3MfOwJX5fl1LQ2Tp7HUPs.ARZyqwKjnLeVJZh1&type=icalendar
Resource
win10v2004-20231215-en
General
-
Target
https://workday.zoom.us/meeting/attendee/tJIud-CgqTorG9wNMTERv_Ot-BoD6NUD0dAp/ics?user_id=_jLqSlA5qPxbf1Q024GiMgJ-Mq-4OQ3MfOwJX5fl1LQ2Tp7HUPs.ARZyqwKjnLeVJZh1&type=icalendar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133477027511762145" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4772 chrome.exe 4772 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4772 chrome.exe 4772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe Token: SeShutdownPrivilege 4772 chrome.exe Token: SeCreatePagefilePrivilege 4772 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 556 4772 chrome.exe 14 PID 4772 wrote to memory of 556 4772 chrome.exe 14 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 228 4772 chrome.exe 25 PID 4772 wrote to memory of 4276 4772 chrome.exe 24 PID 4772 wrote to memory of 4276 4772 chrome.exe 24 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20 PID 4772 wrote to memory of 904 4772 chrome.exe 20
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff826b99758,0x7ff826b99768,0x7ff826b997781⤵PID:556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://workday.zoom.us/meeting/attendee/tJIud-CgqTorG9wNMTERv_Ot-BoD6NUD0dAp/ics?user_id=_jLqSlA5qPxbf1Q024GiMgJ-Mq-4OQ3MfOwJX5fl1LQ2Tp7HUPs.ARZyqwKjnLeVJZh1&type=icalendar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:82⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:22⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:82⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 --field-trial-handle=1892,i,5407206983868155085,16384214437455268418,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e70e7f414e635f98e05015fa05a4b7c6
SHA18fd588a0cff7165ec41e8db410362562b459797a
SHA2562697f073703b943ae05845e54bced4027673c4205b92cad4ff95490de3149d93
SHA512ddea26130598fd9ee1e1e7c535d832612b38b2917f0c701c0a5442d38aa3290895b90f1ef87c9f55e9411679a1007da9b8d2cb5237d677a9c83b55867f542efa
-
Filesize
538B
MD50d3e8a5a937941707ccac56699faee64
SHA1d0d993a289e0c7c38290f93cb9fba8b76240cead
SHA256b69cbc260f1289fb358dce230b7e2e703cc228404aca94555d60da9b9a4454ed
SHA512157cea1c88895bf68cc7c3e3c261f2755592352663d57bed1de87381d61e73e0676ea1085dd8b4ba7f3ac72291edfc1370536ed400e276c80f5b8505273b0961
-
Filesize
6KB
MD532245a69297d1e9429f316d02d1350fd
SHA12a960532975f29468bea77027f71274472566bc2
SHA256c5f2630ec16f4f8977367e011a3d2418771eee5b48e1477ada723ce3fdfc3745
SHA5121a6f41e4abcee9b361f2a28b38886c8f06bfe918921b99eb96610ad974f087a98788253329112558905eecf6d2e3e223bbd3f61af114d580d1b63498a9290fd1
-
Filesize
113KB
MD52a1be3a7eb8e691659f5c553d1a247d5
SHA1d7f952f01049183027ae45bae059017aa33bd635
SHA256c48b2f26b153cbcff6d39fac061b830cf7f10b82480b6afd456746978d9f58eb
SHA512a1acee8e277ba04e37f92588294fa4d2663370131dc6da0f02bb7f74834c48961ca7ecfe3363fba67031307187e32c437a90f051aa37346a20be42cf0e819923
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd