Analysis
-
max time kernel
56s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 07:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cosp.t1cloud.com/T1Default/CiAnywhere/Web/COSP//Public/Function/%24P1.REQ.TRACKREQ.MNT/COSP_PR?suite=PR&TrackingNumber=REQ2024-182766.FTR
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://cosp.t1cloud.com/T1Default/CiAnywhere/Web/COSP//Public/Function/%24P1.REQ.TRACKREQ.MNT/COSP_PR?suite=PR&TrackingNumber=REQ2024-182766.FTR
Resource
win10v2004-20231215-en
General
-
Target
https://cosp.t1cloud.com/T1Default/CiAnywhere/Web/COSP//Public/Function/%24P1.REQ.TRACKREQ.MNT/COSP_PR?suite=PR&TrackingNumber=REQ2024-182766.FTR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1664 2140 chrome.exe 9 PID 2140 wrote to memory of 1664 2140 chrome.exe 9 PID 2140 wrote to memory of 1664 2140 chrome.exe 9 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2816 2140 chrome.exe 7 PID 2140 wrote to memory of 2552 2140 chrome.exe 6 PID 2140 wrote to memory of 2552 2140 chrome.exe 6 PID 2140 wrote to memory of 2552 2140 chrome.exe 6 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5 PID 2140 wrote to memory of 2880 2140 chrome.exe 5
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:21⤵PID:1548
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:11⤵PID:2536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:11⤵PID:2520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:81⤵PID:2880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:81⤵PID:2552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:21⤵PID:2816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7339758,0x7fef7339768,0x7fef73397781⤵PID:1664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cosp.t1cloud.com/T1Default/CiAnywhere/Web/COSP//Public/Function/%24P1.REQ.TRACKREQ.MNT/COSP_PR?suite=PR&TrackingNumber=REQ2024-182766.FTR1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1212,i,3620419492105920931,9826897943900778233,131072 /prefetch:82⤵PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e4f98efc6930e5c9c8c1ecab21f104
SHA1c74b920be09b20f5f743645c908833838324ef3c
SHA256388c7aa942add95ae195a57b3b560b5bb6f3c3ed657871bb8cad37453b63236d
SHA512905e4dc8611c1053ba32db17ef74857e0af1ec11bd9aa0985d229ff5e8aca382ead55b1ccf6bf0809ecef18266637d85c9550b406369e36970b3d22c27b4a974
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_cosp.t1cloud.com_0.indexeddb.leveldb\CURRENT~RFf76ddb2.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD58a9ed935d4169268866fb4511b247e03
SHA1e8ca6fdbdbeb681027aaa47bd56b6576a7fc35e1
SHA256a0e4e1e1c2ca6375134e3c6a7840208b6b3a0c988e1e1f72dd5acb8384bfa8fd
SHA5126da422ecc75b5edffdfb365bc864305ed3a6a41075c5d6e269b161dbd0f1301870831f777205a091a6e2aebf1dfe0fba6d6e792e8f2d6e456135f5624a0ec76f
-
Filesize
525B
MD53e6b0ab09109c08fd00a37637a4620c2
SHA146d2759955a1893ffbe6e549fc55602d976c956c
SHA256c88f432e90236c70623333fa502ec4e9282b7844ef303279ee32f9bd7d9107fd
SHA512066a3e89a173893b7370ef949b9608b59e56b51edf54514a42da20fb1fa21197de1d18792f89244ffa50fff951e82fdc6e72a80cbcc034cdae7bb80e137c8e64
-
Filesize
525B
MD5b16dca4e5482fc6c5660e2b6692ef047
SHA10dbc9a7c8ddc39917387e2db138170289f840429
SHA256193ced18b4f4a66b531f12098ee2f539966497de84283a55a2198b7e3a193e54
SHA51221fcd8699a9f91c5cdfd18559d4119f9cdd52b47c691b5865b9e82ace0cf73315e64ed096dba28f4ab053ee6875cf719e5f2ecda794125981b0850b6fc5ea340
-
Filesize
525B
MD5b9ee95bb1f628cdfb0f76c411a1e8aa5
SHA1208400ca58c73e6bfb37c257c6cbd65501ce122b
SHA256063d77de57c39c06bb83109e8eda207d926df897f6bb096c240bdff7c591a1ce
SHA512abfae733309ebc560ab71e66f2045bc843db499bae14b5934d1292ffc52f40b614fe7acb3491e38774bf11c14796e28ad443503acdfcded463f56238505adcef
-
Filesize
4KB
MD594c5baf0629466c2fb4d54938ad0233e
SHA1e8c6fba74ed572a02dde33239c54603ed88fa7dd
SHA2567697adaaf33e6c0490f3322b0126d02954c8fb02af92bfcab17017d58a8362d0
SHA5122d08584e2bfbf10835c486b85a3c24f4110a57464f3cfcff57487f7330b754c18139f31fbe44b393ca04d3b4f7a5b70ad10028903d6a121b936f3786a9ffcc9c
-
Filesize
4KB
MD532a3a51750cb9e1b6dd17e312f6b78ab
SHA15e3077c34ea295a073e35467e5c7275448666a77
SHA25607cda2a330693e1facf83f453d4a43b2eee85bb3aebfa3b39f4dc1256deb4937
SHA512947ca79751228ee5d926b3c1dd2f3cfcc3fce9732f57a07d3bfbddfa3cf890660dec18b877f84f357ccaf1db2acbe7dffc0f580e7e8636abd37755bf44425d51
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06