Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 00:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.sherbert.cimpress.io/v2/folders?folderName\=PUH5GJQHQ3LKEI53JU7MTLZDTKMQ2JFQ&scopeToUserFolders\=true&tenant\=wHqiv8SHZWp8fdGHeZ4Sp
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://api.sherbert.cimpress.io/v2/folders?folderName\=PUH5GJQHQ3LKEI53JU7MTLZDTKMQ2JFQ&scopeToUserFolders\=true&tenant\=wHqiv8SHZWp8fdGHeZ4Sp
Resource
win10v2004-20231215-en
General
-
Target
https://api.sherbert.cimpress.io/v2/folders?folderName\=PUH5GJQHQ3LKEI53JU7MTLZDTKMQ2JFQ&scopeToUserFolders\=true&tenant\=wHqiv8SHZWp8fdGHeZ4Sp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492336656291364" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4524 5092 chrome.exe 60 PID 5092 wrote to memory of 4524 5092 chrome.exe 60 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 4532 5092 chrome.exe 90 PID 5092 wrote to memory of 680 5092 chrome.exe 91 PID 5092 wrote to memory of 680 5092 chrome.exe 91 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92 PID 5092 wrote to memory of 4284 5092 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.sherbert.cimpress.io/v2/folders?folderName\=PUH5GJQHQ3LKEI53JU7MTLZDTKMQ2JFQ&scopeToUserFolders\=true&tenant\=wHqiv8SHZWp8fdGHeZ4Sp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf54f9758,0x7ffbf54f9768,0x7ffbf54f97782⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:82⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1864,i,17726781503227500070,12949925540146285489,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD513336dc58292ab3d24f0791a5611fc71
SHA156a5db4154e9a233460cee4965893bccb6977174
SHA2562a77165d95b9d67b6286c8aaf2b733dc684cfbcf75bd5055fc86653e5fb71245
SHA512adf43179ac7547c195385b4cbfbbdde9f284d61064c179bfe8898b6d65f145562d76e9c2aca9b75e8137331ecc172f1adcc68fdf3d5bd82ad22498bec60043e0
-
Filesize
6KB
MD58bb0b71e7ceda4d832f2a9463a85a3d2
SHA1800482354e9d867e5fc2deee7c099a822e44bba5
SHA2569268929c54fe9b4828384597cd6811040bfad7973f947a9ce8400aedbf55405c
SHA5120e42dc0c17c2b62ed5354e3d07a855cf6f9f96949619696cb5da399bb248f34ee107986c309c154481d3f5f1cdc0142ff6abbf13ed445a7728c9d7cec80b3d2f
-
Filesize
114KB
MD57473aa3e2b8d5c0fabc724d212f6c7e1
SHA151662b574c323271a9723266d6b4f0c38141fa25
SHA2568ec5262cb5bd3902776e118668cc5a572fd2da217290f3611b4ac094185dc21b
SHA5129fcf6f59da6c94650760c88cf19ac4c2783c14d4bf64f5ea49f80bf308fabce3fc0d65c5d6ba7b0a96daff14a2113225c3a52861f4e02e61f5b89d51975b5e53
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd