Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 13:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d157b604.na1.hs-sales-engage.com/Cto/V+23284/d157b604/R5S8b49b8N6L4C0J2d1GZW3LHK6R20YD53W1_jnsH3LG27xW21hlKF1V0qMfW3yRtcj1Q39FRW1Y_5ww24VhNyVhPQZQ6qm4Vz0
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://d157b604.na1.hs-sales-engage.com/Cto/V+23284/d157b604/R5S8b49b8N6L4C0J2d1GZW3LHK6R20YD53W1_jnsH3LG27xW21hlKF1V0qMfW3yRtcj1Q39FRW1Y_5ww24VhNyVhPQZQ6qm4Vz0
Resource
win10v2004-20231222-en
General
-
Target
https://d157b604.na1.hs-sales-engage.com/Cto/V+23284/d157b604/R5S8b49b8N6L4C0J2d1GZW3LHK6R20YD53W1_jnsH3LG27xW21hlKF1V0qMfW3yRtcj1Q39FRW1Y_5ww24VhNyVhPQZQ6qm4Vz0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504897889871078" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1096 1048 chrome.exe 86 PID 1048 wrote to memory of 1096 1048 chrome.exe 86 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 4612 1048 chrome.exe 88 PID 1048 wrote to memory of 1416 1048 chrome.exe 90 PID 1048 wrote to memory of 1416 1048 chrome.exe 90 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89 PID 1048 wrote to memory of 3272 1048 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d157b604.na1.hs-sales-engage.com/Cto/V+23284/d157b604/R5S8b49b8N6L4C0J2d1GZW3LHK6R20YD53W1_jnsH3LG27xW21hlKF1V0qMfW3yRtcj1Q39FRW1Y_5ww24VhNyVhPQZQ6qm4Vz01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bce39758,0x7ff9bce39768,0x7ff9bce397782⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:22⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1880,i,9285920015717394635,3558853069687123811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c1a88e8b709d0c17fb3a45a8d8639e99
SHA1b8f03530dfb65ef355f145210286cf1b2f7b73a2
SHA2561ed026870ed751b29737b76eaf51b0fe66496cf04e43c6f2b039277708b2038f
SHA512692b377721b1bcdf5e0860ee99c50c0225d3203f6e8ae7dd4fc5d65aed3723e08553fac8155b902c7062f8b4643cf6e9eb6326ab36e179c3e1d649047760e63f
-
Filesize
914B
MD5c6a46be10e9d12a75114ed478f74a617
SHA15a1918b27539cc9032a7613a21cd0c55d7b7bd08
SHA256094054f09fc44e8929d10d7ab102903f3a625c881b0fa1ad7b163fc468122cea
SHA51202be32671426e22e2949cbbfce46286e2f38000ed4edffc2524335b77dfb242384b90925eb28bba713c74cbb8257f9e718fa60c997f5bd7e204eddb5f8ea1675
-
Filesize
6KB
MD5ff89759f0a2aaecfc361296bb30d4ae2
SHA1e6ad9a1a8687acdc729520b1b065dc01986f1ebd
SHA256541830d8d1f1d44420898fc092484ab499c8a9f6e6a7c35bb983b977ffeb3e69
SHA5128dd543e8514f8fd6d62a0b42a0ceb680d9cdc6a6d793d6409a5de94ed6d166c404bcdfbe645ae1a8208e630667df20066b58ede840527cb9cdb9ac60fbb75307
-
Filesize
114KB
MD5754610c5dedbbda96757402d973484f8
SHA1b5a66f376e1e323f781d121f0833d24471301b87
SHA256f0c22ab675202f3113dc482a07c923b1247ff7e4b507fd852f8809b3f31655c3
SHA5122d737a0bf2ade2c3c2512076031b4b1d6e43c5b84772fee8318d86ef81e7d359a5f69cbed94dd00bc004dcacc1021ba40b4cf92d1bea48b9ccccadeb6ba25dc2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd