Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 15:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://groups.google.com/a/appian.com/group/digital/
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://groups.google.com/a/appian.com/group/digital/
Resource
win10v2004-20231215-en
General
-
Target
https://groups.google.com/a/appian.com/group/digital/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486836658834445" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1824 chrome.exe 1824 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe Token: SeShutdownPrivilege 1824 chrome.exe Token: SeCreatePagefilePrivilege 1824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 3340 1824 chrome.exe 14 PID 1824 wrote to memory of 3340 1824 chrome.exe 14 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2948 1824 chrome.exe 27 PID 1824 wrote to memory of 2040 1824 chrome.exe 26 PID 1824 wrote to memory of 2040 1824 chrome.exe 26 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22 PID 1824 wrote to memory of 428 1824 chrome.exe 22
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88dcd9758,0x7ff88dcd9768,0x7ff88dcd97781⤵PID:3340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://groups.google.com/a/appian.com/group/digital/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:22⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4752 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:12⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4916 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:82⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 --field-trial-handle=1840,i,5958653828803719861,4069591140824026359,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD527c7de09d8548b45941288b5bd2e8270
SHA1f09dd8ef26e325926d44bc5956eae09b42d386a8
SHA25687d90e31d48776b1c79fe8450f2d7f475be35eb94267350535ad274b657522e7
SHA5125f712b89790e951c33170405609c234e8164fef1fd3e49257d7ed41e1b2abcc14a9b28bf8a39a07dffead910c92516c175b87b924abac419c651b984f52c03d0
-
Filesize
6KB
MD57189178973a5ce53c8f9f228cee3c8df
SHA139432a6a8755ed47c484f85c6e8f8331c6150858
SHA25656b2bcda717032056967a2fb0c5fcf444c9c4f0a90d74054643ff7ce5480264a
SHA51243dd9bbcbba97d00ba4f16cda800f2bb92445e37b57a78c4bd97e925dba5653fb65bbc38e04000aec33a9239b8fcc74177446d94c87cd6ebf8eb570296dba3df
-
Filesize
114KB
MD5fa6041795af1895f3da58b98c898f6ac
SHA1a5a194fe2e47e82f9420086a6e036d461f923620
SHA25685e8bf3c0bfc4789a653b4a22f75123e124a944a5d6c78156e3ae4ab1b48f80a
SHA512bde9a8e1cb95a5bd060cabe72144069b9706a48d2b8858671c93ab5ab97bff4045a71408ea28f22fe91442c105b802738469e05cdb2004c9a9a24e02288e3e4f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd