Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 18:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/1nl7CNknD0sN5EJMzTmwwFV
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://protect-us.mimecast.com/s/1nl7CNknD0sN5EJMzTmwwFV
Resource
win10v2004-20231215-en
General
-
Target
https://protect-us.mimecast.com/s/1nl7CNknD0sN5EJMzTmwwFV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504225991465209" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4580 2008 chrome.exe 84 PID 2008 wrote to memory of 4580 2008 chrome.exe 84 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4488 2008 chrome.exe 89 PID 2008 wrote to memory of 4552 2008 chrome.exe 88 PID 2008 wrote to memory of 4552 2008 chrome.exe 88 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91 PID 2008 wrote to memory of 4372 2008 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect-us.mimecast.com/s/1nl7CNknD0sN5EJMzTmwwFV1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccf379758,0x7ffccf379768,0x7ffccf3797782⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:22⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3836 --field-trial-handle=1908,i,18380548258582012275,9900783880224466059,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD57fcd61f197fe86935960bc5cae9b72b3
SHA1008250526528e4cab8da8cc7470bf478aff75be6
SHA2565c2b82e71767e00d7a6419c6e7fabbb5653a39bed2c677731a92ff22a0edaf6c
SHA51254cf3d83033fc64e0144b4271dc4448656fdd6c91bb779ae6df96975304e37f04ad6eccb0dce4e2ffce93823e6a8b625fc5bbf12719d984c4a473e76a3ccf19d
-
Filesize
2KB
MD594b1613f9777530e3323eb90a2916894
SHA1a6a6f2611b6c6faa7ea717c19026c1aaf22d9d21
SHA25671eb0a7a5cfc179a61790ea304bd9076f71a2fea12394fd019bcf54baa911a08
SHA512681224faf55085e1197d773d7fbe77bfd6a63faef67158732e0f8c15804632ae393c6560c1fc759a1dced2d4ba37e7464b113f2a458adf3b1e0fb6287e9c520c
-
Filesize
1KB
MD59e766f47577e31d6a24d491e8a9d8d4d
SHA12a292255b0b2219240c3799572e1119b32c68b9a
SHA2562f7b7597cd5ebcfcab6b6912b2f5dcf3bb8a83684b46844ba211a060a541f359
SHA512999b773f315a45523247ec3a77e552ae63be11636ac4495b463dcd8177ab92b0e21f306a2be7eb96cad7989e0708f88b9ce4f9048eab207f24d04e6baa89fd08
-
Filesize
6KB
MD54856fb3b70fc5cf04fcb413900cd551d
SHA111b891ea8d6a0cb60f0d7b0b34f017952d7e8e94
SHA2564ea5c69e4199f5ca0b25f2b6437c3e69d8f76d2684d380e231fd53eeb63a3c1a
SHA512cc859f3f7c0d5e9ae68588c758a2b3eab707d2046b6e624602e7e6b6330dbf5f8880295f83d60ed065d5c35bb501228466ce5682cd0d7ff9352f14118ce15a0b
-
Filesize
115KB
MD541a8637150234959f6c6b27b52e7f522
SHA1bef1df78e3b7f117414b5b33c097f10bec3c5bc9
SHA2560ffb580198593ddbc239d663966570cffe36f54855f9112c0bf7ca1174c4dd57
SHA512b170b09aae5db73274a61bf36edd6cc7a16d34867de43f219b372167744b62fb824e347b6a17399a874ef50a0f6eef9528ffb64c995b848dfb234d31be115017
-
Filesize
115KB
MD5d5e2715ede55f727f71729573406a1f5
SHA1ece0fe06112f994209386f94968ba85f34073140
SHA256d817049951fd98c15d1c193f456433384ec0c51bdcdcca6763d6cfd985430a6d
SHA512deb68dd7705928afff49dbabf0da2f0badf87fa47f4ac7f9af2c3513220822aae1502c7e737f1efbe82d4a2bcd14b9dbfbea91f12338125acae9679ccba8843e
-
Filesize
135KB
MD5e63464e4a0b3b8e543b8a2d7ca056417
SHA1bbeac2b57b4a44dd68b47578cb9e1e1eb5a283c1
SHA25641498931158b26c3e4ad8b9c19c7b3207e0c1bac250fafb6f922b7c5820c9597
SHA5125a0f3fb60573ead44dbb3d6e5cc4d33f46abf01369126a515c95341225436f6449931395a8e9b198955858f6cf48741b9b6e1634088dcc98b785d4d4fc17f0c2
-
Filesize
116KB
MD5e41698af03a0f138ba78f4b787f03842
SHA1738faf9307c3f95dc3957d741142ab34a379f09c
SHA256cefeaa45bcd8d648d7129044ac3b8e6c7eb0817c28988b6dd8a321e1a85c8af3
SHA51211dc2869df9918b962c5429155017f9f5ac1619bdc22a8a83f74c44a276137ca73bf79a415f045042884783f4d54a416027ced56f9f25b65642bfdfbb7be4d66
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd