Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 19:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://higherbridgecapitalinc.sharefile.com/d-10db3359c3ed4f19
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://higherbridgecapitalinc.sharefile.com/d-10db3359c3ed4f19
Resource
win10v2004-20231215-en
General
-
Target
https://higherbridgecapitalinc.sharefile.com/d-10db3359c3ed4f19
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 84 api.ipify.org 86 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133499940718697876" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5108 chrome.exe 5108 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5108 chrome.exe 5108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe Token: SeShutdownPrivilege 5108 chrome.exe Token: SeCreatePagefilePrivilege 5108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4468 5108 chrome.exe 85 PID 5108 wrote to memory of 4468 5108 chrome.exe 85 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 4804 5108 chrome.exe 89 PID 5108 wrote to memory of 448 5108 chrome.exe 91 PID 5108 wrote to memory of 448 5108 chrome.exe 91 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90 PID 5108 wrote to memory of 4752 5108 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://higherbridgecapitalinc.sharefile.com/d-10db3359c3ed4f191⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc82d9758,0x7ffdc82d9768,0x7ffdc82d97782⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:22⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3608 --field-trial-handle=1876,i,14668065687099127875,3140392503531251415,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD5a82e05801a46f2f4d55c58f2559907a5
SHA1055b4c3926369fe393696c024ead1679c202fc53
SHA256574e3556a08c7f36a7f3c33a5ed223437b29ecb950cde5b60382ad6b5aa9873d
SHA5125e390a1068dcd92edce4c804cedbe3d3f3ed54290792861fbba4335cf1ab3d33732f8bbc1d8c47a2f5d9755f356d363eb5c294e2b8072cea565f2a2c1bcf7a53
-
Filesize
2KB
MD5cc988c55234388b297d88caf67b3f539
SHA179f41ccca55ee8d6d94c190697430f6a9f96eab1
SHA2560b29ebaec76d41ac5559d48c51855938a2486320e077476a910dfdca785fe09f
SHA512aa2ab2423f9d78014f7982fcfb9924f1a9d70651ca248272c032c2b638fc7615547b972ed7ceef2f6e4e3c587ebacc6366cd5175d7dde894eb6e853b3faf11cf
-
Filesize
1KB
MD5bff825776dad81e63cdb77371ad53d98
SHA11fff37a7f13f8527cc83e0f0fb6f36297e9ac582
SHA2564cb6165eee0931ce6a46d4c42d4fbd8f8cafd6d26776b4c1b4e40dc696a5f367
SHA512173f08a39e2eb0fc681a3e2eef1c74b9bb3b157b49196d98e0d59b0782f934f1d1a9491c926fa480dc79f8311bd9f17b9845d6baf5d251590f2690f85a1b3447
-
Filesize
1KB
MD560fee447dc054fa2b50300cc4f0e176c
SHA1f00a39bbfa9fc6e04ecf749764e3be593d092961
SHA2560e6d05fbf0016aad572cbe5b975dd4b09bf1594c0a39a030a199333a7a1b43ab
SHA51280c657aaefdb94afdde24103be13c8b4ff3af06d4723b0383435fbea5d905882e55b790edacb474ccf2e7e4e98a4cc4f0d93d7ae7757cd06e2398af5827cd790
-
Filesize
1KB
MD5297f4decfde6d6773c99ff0cb892ea21
SHA1f6f5f4db80bc6b7104d1ab484127d1282f328098
SHA2565c9c5f432e3d12cac265f2e9586b6ab47d194e0ea938cddf836b197bab3c33fb
SHA512f74ab39e80459f50bf860e008130e2286f9894559a97f1334970813c6a64889ff5df521665e4c84a42fdcc4d0a6ae1706cc1186749901a4cb3cd494feafe3196
-
Filesize
6KB
MD51a0e348a41731c15af5a1857999daaa6
SHA14bdc6f0bba503f0491290b089b2fe20509cfb5f9
SHA256e05306af8f55d23cba5a812b9d42080cc923b0dbb0834955565b29c7d904974f
SHA512ae1c51e35825423edde0e9726d9021472b3aac2a12c07a83766d69bcfc8765c841231e76aa497559ca4e93cd59957f671bb13b0e22ea000142d2deea4e3f45f8
-
Filesize
114KB
MD5f060d2102da814411fc4cb622138793e
SHA17bb21848fb372428f3ed6c44803e2bea71120865
SHA256c15b1e122e13919e47169d0fe39dac38d52badf04d7df6f315f643c210867753
SHA51235e1453d1c89ba5003da6601f0d630e9002c1bd313d1b4b27e3db847092c3612fb2c99499d3ab329b9b09d452c43fcb57e51debf69abc65d5c5929c13f8e6ef0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd