Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
08/01/2024, 23:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://liveramp.qualtrics.com/jfe/form/SV_6As7cFYujTl2zQi?Q_DL=1u5r1MelgrrFFZQ_6As7cFYujTl2zQi_CGC_Xc8ULjKQf9S99Yb&Q_CHL=email
Resource
win10-20231215-en
General
-
Target
https://liveramp.qualtrics.com/jfe/form/SV_6As7cFYujTl2zQi?Q_DL=1u5r1MelgrrFFZQ_6As7cFYujTl2zQi_CGC_Xc8ULjKQf9S99Yb&Q_CHL=email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492306212430026" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 168 chrome.exe 168 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 2716 168 chrome.exe 73 PID 168 wrote to memory of 2716 168 chrome.exe 73 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 2084 168 chrome.exe 75 PID 168 wrote to memory of 4884 168 chrome.exe 77 PID 168 wrote to memory of 4884 168 chrome.exe 77 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76 PID 168 wrote to memory of 4444 168 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://liveramp.qualtrics.com/jfe/form/SV_6As7cFYujTl2zQi?Q_DL=1u5r1MelgrrFFZQ_6As7cFYujTl2zQi_CGC_Xc8ULjKQf9S99Yb&Q_CHL=email1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe44029758,0x7ffe44029768,0x7ffe440297782⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2040 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4596 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2504 --field-trial-handle=1388,i,11521179012747718463,10774531583514504996,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
Filesize
360B
MD5e26ebd9461016fd5d766d449caf1a52b
SHA199bb833fdb8e48fc3958c9a08380cf2adea2ccdf
SHA2561eca3f1bfb4f9021af92a0432adb47bdc14f30b169d12ae7cfaa6077bfc971cc
SHA5125ab3726253cee2f10562e1de7ee6bb68baeb0c4dc3f67be0941891eb4a4ea42a9cad824a2ede95d3a9d0f6ebd6c7238705eb2a84d078c54ad751f75c1230769c
-
Filesize
2KB
MD5e0b9c969bbb22f71a31329248d270fb2
SHA1a218aef17963b987914484791c6c5a17d979f089
SHA2569d25fbc75368a7682f08998f78351cb462a7b5565e133e42e2c0cd1161e0396f
SHA512d7f94ecb7c859e9b48047db3565aed120c7c222983b8a4d91cc6be9f736e82af463d48769d27347b6b8bd6d181fd7d3c5140900e665fa07b58daa6cb8e9a8489
-
Filesize
538B
MD525e0435c7518a707d875d6a417191414
SHA1111dce6d83aa6142c37dfb13567b9bf8f0438023
SHA2562f3b0d68ab349471d6035769f8236cc93df884777dbc92f8dc55aea3d1ed6512
SHA512ce1c11749cea113f1ce04f3eeb989529595cc88de2c71954137aa23fff8f20b8e7d0c42292a1fcf37ef3e002ce39162d49916684de68789e8755cbb035d3cef2
-
Filesize
5KB
MD5bb61f4de8b80dc16f1377d736d2bf9a4
SHA173ac046581831e3cda299de93daa91bf64833428
SHA256ff165bc45471dd39fee2bde8f48927997ab367bf52ded981af6824c1ce0d7bf4
SHA5124bd4316e22f2c0011d00bd9dd6a5f17ec48f9c14f05a3886fba8e7e79670681eee171a57350d6b6cd5c1d997614cf67c5bbfff76d845e8c7334d72fe9b75f00f
-
Filesize
5KB
MD5a94459e7b3f0642b9170fcb7950cd4cd
SHA1945a8e3202d00f78cabc0b3244ce9f10a03f8677
SHA256fbc876cd547e57532a93f49bf58e2a6400f70859b464a58a0234d6cda98437c0
SHA512253949e091c89428ec3def050a34700005d90117ac00eb6623dec5516b10329db45b28bebbe6674a8e1c89f0cfdf35d88da988d664648730e8f4780b43733b3a
-
Filesize
6KB
MD59a10fbf1d4ea7c27bd50ac3f9df4082b
SHA1512f74b5de02a612bad78b7d90de2aed34e94002
SHA25653152d5bdfba73f4f7e240c6a3364177f4356849437907ab1a9ee98ed235b1c3
SHA51206fd478f61ee793d1b4f9782386caf6d35e0de8b7dee8f9c82cbe8efd95f9d260930eac3a9cce65e12b5c35329079b7919320d536c6d34a416281223d8c91e53
-
Filesize
114KB
MD5c858fbf14ad158a57c33d24fc5a20c3b
SHA10f11590857435f10ec6b37fca5489ef30c4ec57d
SHA256af38e0ca937886e890132740143c57dcdd6f33c35ae614c3ae44c97513e0b39c
SHA512364bd23a12848e4c542aabeb0ebbb0810c85c710a43229102372976d32238c6560813cc7f1c8c683c593369ebd3bbf2387d93f520fca88b2976e71b6532c4d66
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd