Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.aon.com/market_relationships
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.aon.com/market_relationships
Resource
win10v2004-20231215-en
General
-
Target
http://www.aon.com/market_relationships
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133480315773649676" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 996 chrome.exe 996 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3052 996 chrome.exe 55 PID 996 wrote to memory of 3052 996 chrome.exe 55 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 3040 996 chrome.exe 93 PID 996 wrote to memory of 4516 996 chrome.exe 97 PID 996 wrote to memory of 4516 996 chrome.exe 97 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94 PID 996 wrote to memory of 4056 996 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.aon.com/market_relationships1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e039758,0x7ffb3e039768,0x7ffb3e0397782⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:22⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:82⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4100 --field-trial-handle=1904,i,15283588249595909396,13706030575005392479,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD53bfd269da41659452424d50862f2642e
SHA19c6e1ad371fb9eeb0773a9a4d5dff95417c732f9
SHA256c73fd7fefbf8fe55184f5bf9fe0267b590ab906d85743f6bc62d2fb02daecbb0
SHA512cfefd93b7299226d49a2cf5ce3f2de0272ed10896787af611880eab464741a41fc41d9ebe117230973afe8a6bf0f58c5ef7174a79e214b2eff9fdc4785bf89eb
-
Filesize
528B
MD50cc9d78d08dda3f486126e76511f8b05
SHA1fcc97730fae8f0cc1f3c6c29c1ae99c76c2029e8
SHA25614f8c1987bee482bd5cc4a829b2abddde665c4f700053e11c16e2b9183bd370b
SHA5125b15cbed391679ef4b161d2005bfde0b9deaf3a51edaf368f06f44cececd9985117cee004e50959a61b33713f809db7c4aa6899a65d8206e76ab78519a8f75e0
-
Filesize
1KB
MD57fa2d354e94d13e3051b7cf636dc2665
SHA19e575ff4b4b4edb3c2f436bc7627f651dad013e5
SHA2564f2d1e6b53966d0a45b085a5d42b93b1c6732587494bb4f8c95a0ecf070e7dc5
SHA512325d883c31f12d1ea895a500a0ca7fb4538dc9aa99f7b29a680421b7ef3effa5faf10fa829c11395e417c84a3c05421de18892564d15503a8c2160dc26dfa6e6
-
Filesize
871B
MD566e4a17aae872bb37666c6ea1e73721a
SHA1d95efc2e6988e1e26881305cd8c891e3f408000e
SHA256fb13bf8cc4382319bd79273bc72a625c28618dfb8be6232132c2dbbbfc28ec07
SHA5128a7f8e83eb90f5bdd362d3601d8379027045c98239ca040a8b20fd6fa3f900af3f0ad1e28d9b3905675fb687ba1d3d856dda806ea3df76833a50662699f46fc8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\da2cb25c-2f57-4189-9900-75bc50af9f0f.tmp
Filesize2KB
MD54f4c6a8c32c653eaaf87db5045a38320
SHA1d327669b48b40b3423b32ebf9e30438d8e680c64
SHA256020c0a3f5b1d80caa291e137acd3bf1212175480d5b706c9bfe4c395f814b1ab
SHA51268f0ec58a9db264c46983c0ceefd8cdbd59eda23c45a850e53a404036f834dd68d702c4ff48f3d4559d67727cc04feb1067053a24972dbd6052791418b02675c
-
Filesize
6KB
MD57d794ea59d0d3be581c25e0f3b7bce42
SHA1a374f3e80b8f4000f49fd9a55326dc741542d257
SHA256f6c704f4a36c02a3e33f3affa6f721a7c785c15105b26bb656e437e0453dced1
SHA512b2db5297c81586b0d93519c022feccd00e3defc3a66c79657f0ad68104e407acd025cae396fc1214c5de519db15998674e6684d6720d263d805c2c64ce553d95
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd