Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 17:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lockton.sharefile.com/d-2c2e9d672fe640ba
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://lockton.sharefile.com/d-2c2e9d672fe640ba
Resource
win10v2004-20231222-en
General
-
Target
https://lockton.sharefile.com/d-2c2e9d672fe640ba
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500741235610475" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 chrome.exe 2544 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2544 chrome.exe 2544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3888 2544 chrome.exe 17 PID 2544 wrote to memory of 3888 2544 chrome.exe 17 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 2844 2544 chrome.exe 49 PID 2544 wrote to memory of 3924 2544 chrome.exe 48 PID 2544 wrote to memory of 3924 2544 chrome.exe 48 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45 PID 2544 wrote to memory of 1640 2544 chrome.exe 45
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d5f19758,0x7ff8d5f19768,0x7ff8d5f197781⤵PID:3888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lockton.sharefile.com/d-2c2e9d672fe640ba1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:82⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1868 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:22⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 --field-trial-handle=1888,i,9661430264766594272,15829843574105034113,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2728
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:2380
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD58878bcab872257fb2f70fbae9c8f474c
SHA14300301d2b32fb95e69d7772a0ee4cb5e255691b
SHA256fde79d68950436c133c24c2625819743436569f8e70a398e2da2139508a5c9fc
SHA5121e944660ac4965f42173b5b4fbf24d2afb97d53d6564d914021b52c397cbeba98e737394da65cc0a3803e63a2a1e0d95488b70fddf156bae975bd408edb3e81a
-
Filesize
2KB
MD5bb22cebc810e652944467e5c4fede990
SHA17b5a38b6f46c95a46a4b9318d100e3389d8e33cf
SHA2566e320acc73dc463bc033badb62de4900fdd8f12872c6f56c2e7411fa9672692b
SHA5125e14bb29175b5334d8fba4223d42a07d11e53160ad47ee7f8c2bd246e1ca30a35dc9580595f2d21a27c0505c24dd53c1f2483d0c080a8344c44d3fe767bc6b68
-
Filesize
1KB
MD5608623588d541b0dfa16bf575bf68362
SHA1589e75cd23ba470c3e89c24b146687f7c12d9d3a
SHA25604eda319313a6a882aa5eedf790366d68aed682c1b6727fd36924ea7b2fccd5d
SHA512d85921d32f6687ebffb8f9a3da902fe8936e04a07481540857497da8b61713ef8979ebc7ee562dba87c90aaf7703ad3173024c6cdbcf8212a723bd154f7dda65
-
Filesize
6KB
MD5981369cc1092e3d01a5b81d6bd541371
SHA1c55c1635438d68b6798df8ef32c7ae9875cbe709
SHA256a9c7f24620feda490c1d07bd34ab5b45b9a30e6f9727a4cfd7c5132d3570c128
SHA5122eacc2ba8ab1dbd55eda6ac65761405d2d4d74074acd8ee35f7596b7e871cf53756f56971212288cde20524900748271daef8ba872946f4339b2b0a898705f98
-
Filesize
114KB
MD5723305f3cb99557725d1d9f17d0f91f7
SHA18cc7e443bafcac5197ba7490ad3a9fdd621e9ec1
SHA256eae98dda76bf4228e2be758219d6f18cffed1a56ebc8efc8da5924922ca90534
SHA51269a46026d9447de0c48d07aebd8372c8801aed3c5636af47df34c59b32ac2534ee51282d2e5c1134332ac14fc3f9a3986a73b4790bb3898ae01c116e496a24e7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd