Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 17:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide
Resource
win10v2004-20231215-en
General
-
Target
https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500723124386990" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4780 4688 chrome.exe 86 PID 4688 wrote to memory of 4780 4688 chrome.exe 86 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 352 4688 chrome.exe 90 PID 4688 wrote to memory of 3224 4688 chrome.exe 91 PID 4688 wrote to memory of 3224 4688 chrome.exe 91 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92 PID 4688 wrote to memory of 1248 4688 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffeccb99758,0x7ffeccb99768,0x7ffeccb997782⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:22⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3316 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1884,i,14504527140523102619,10600930088584262624,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5550177d1c964c80521489327e427261f
SHA18c1b9e6ef26506a25891d8386e52131ead78a836
SHA256f25fcad185cd082d12cf31f0f10a4f8b377404135fc3db32272e085227890d6b
SHA51201db6facf3f65860ab8bf0d5e7fdebb903801fa2f15c52fd5064edd37f8f7bf6bdcd28a97b53c82d3b10979dfb8031854f80dab9cc4f36ec5ba6c115667e05b3
-
Filesize
1KB
MD5de47d0d38f53985d134a39016068ea10
SHA156c7c898ec47e9b50894e1665fee080b3cdbd8a4
SHA256e72e193ab86de50716661f79ce62f0744e87f405a9b2285a7701bf74a8a8efbb
SHA5121d45a6a17c88bf153cfeb8e579d12d36f2588d198bd5a639201395d2b33503a7b267bf952cc560c5ecf62df466c4e7fd984dffccbfc44f2d585b300e2bc40279
-
Filesize
1KB
MD58accde7d59fa71125e0cb8b8051237ed
SHA1b6b188cae842aeb1f857e5510ba5429f61d26e7d
SHA25664ed55eb9504db85e6a20adf0bf3d70cd05a81fa4e47be19c7e92121ab5097ec
SHA512043e0164b642604a14f6ac66f72a70e11fa8479306c49aabc43bbebe95e25e9ebb9073062d98af670b20f2ec146378cdb9dfa5bd15072d016492d91164d24690
-
Filesize
1KB
MD51d83b60d30368c3e63396e9ea82a154f
SHA1e7ec8b1e954e64c06a83006125da861ae085667e
SHA256aa123d28556f1a21ced57ccae3d85d176eb49637c708aeb0f3f736dc46ae3986
SHA512d817b368cfbd9dc08ff9da8f16901b3d251543bac42c6107fa61edb5b7482fab4c405b08dd7f09edb5ca4b44b29b49f0f7cc2c3c8204d3e8b8fe3bf0ca04ac04
-
Filesize
1KB
MD592d9c242f59b5d38e03210c7b0e8a5f4
SHA1d4baa0c63fbcd8151c9bcf23712c8af57c22c836
SHA256062495fa87cdc3d76e56676e0638f98516fa1e7a700696b0e47128f691449785
SHA5120a977bf1e4940c77cceb9a31d4b0a856209ce4e86be90cf06bce284930d2b42623a9a16bef51a32ce537c076cef345c51b37d6aecc3030b181a216a09da6d8f3
-
Filesize
6KB
MD54d6941e824d4931b4ad30627623c6c61
SHA1c669bf5d17c8fa5c4c59d190a345a878b5ca7b90
SHA256ceca73073d36e4df5c09b478813e039b58882f17fb5fb293c82281e9fe3b2af7
SHA512557560d4608eb02ef04e6d8bb394f07e01b77bc3cdb7a928b18ec8c44fe820123ea19cd7f745c2e10dda4993427b915f54572de207c948a2f0be4378396dec32
-
Filesize
6KB
MD55a879376f2503a6d9502f18007852151
SHA14077b77ed53dac6c546db058d130432787a59343
SHA256a014b99efb512208fbe10f2a25be480514b58f54d0116329a6b5ad79b10fe796
SHA512c22400b247dc129b8c2d0b60416981abe5166389dcf1ccf3c84b822ee50e1c74c72ee4044681b6eac4886908f73aff1e6c41119af150da7fda2882183ca9aaa1
-
Filesize
5KB
MD5676de1868c2deaa1c1b102d48fb4535b
SHA18c6a4ec1908cfe946addf80b5aa4f1a9330b8608
SHA25600effc0701ea4ff34b1bfb1fbb4d31ca9565b5a0bb633abce055e2ac7a29b9ed
SHA512c1e6114ffb02d05f84301375ba8215308e592307524a432656d20922ccd7ea399cd17c9046734b321be0bb306704128ce46a3c271ec0cfe1b71666b759717415
-
Filesize
6KB
MD56a00e0f165ed58a21cb7d0b05cd16521
SHA19db398e120df4da85b4b0b0fdd3d41c1b46523ac
SHA2562f43b7423c3cebf0263de597d93f1e3b0e575f1164d7e75ba66f64d9d1de28d7
SHA5121db6f09c4d843833ce96166c19f07eba87d55c10a5defc850ae7cbffc188c4664cbb3b7c4dd7b776d56f11179bee103cf0a9c25566a8bb1a6312cf0026f1ce93
-
Filesize
114KB
MD56cf8873e51aed5ae0bb72b5bd61c2688
SHA17eea8518ea5469636a1497cca013fcdec176eefe
SHA256f6770093cf9702524355a15eba428a2a69ab336d8994e03dbb1fdfe01d726f58
SHA512b23124a6b27ecd05d0ec7cd0d460380cb84b48c28118640a3b9d52c525cf651a6f3e51d8df5fbf52bff904c7dc513155c19c35b0ed5fa2ce7eaee54851249f06
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd