Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 22:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://healthteamadvantage.sharepoint.com/:x:/s/accountingandfinance/EZ8PHppedKJMiV0DvDosom8BLhi-DEuNlujdQX71SRlSDg
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://healthteamadvantage.sharepoint.com/:x:/s/accountingandfinance/EZ8PHppedKJMiV0DvDosom8BLhi-DEuNlujdQX71SRlSDg
Resource
win10v2004-20231215-en
General
-
Target
https://healthteamadvantage.sharepoint.com/:x:/s/accountingandfinance/EZ8PHppedKJMiV0DvDosom8BLhi-DEuNlujdQX71SRlSDg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506962591629699" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4456 4584 chrome.exe 87 PID 4584 wrote to memory of 4456 4584 chrome.exe 87 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 3280 4584 chrome.exe 90 PID 4584 wrote to memory of 2868 4584 chrome.exe 91 PID 4584 wrote to memory of 2868 4584 chrome.exe 91 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92 PID 4584 wrote to memory of 412 4584 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://healthteamadvantage.sharepoint.com/:x:/s/accountingandfinance/EZ8PHppedKJMiV0DvDosom8BLhi-DEuNlujdQX71SRlSDg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe353d9758,0x7ffe353d9768,0x7ffe353d97782⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:22⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:82⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:82⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 --field-trial-handle=1876,i,10760688970925598820,9635399436513144079,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD510bc86576fcf6d5c559b32bdbe5537dc
SHA18469f4bcea77dc00464d35eb9c2b9ca58d357972
SHA25630ab3336b4da101436ecb2d25f6ffbbb4f0d4fd1de0ab51562a01fac358d4617
SHA512f7993a3b3fd52b6bd81d968d4ccf26b8266305a0bde4af42bae42dd65fcf3bca18b901f1560412a240d13afdd6cf7969793894c66f5bf83f05e356dec8972a10
-
Filesize
1KB
MD5d12d52eef65bc3d4e746c70c570ab8fb
SHA1540f29c2b9f8feac91d9993bb3fa3b1997301160
SHA256055b6e50daad279b439bef558a83d6a7d0e42c89a98569ff7c7330ca8f6f029c
SHA51219e9a4e7c2795397ed237589ef1aee18c649aa8980518fc158e713d7984a131e91a4864e19fe968368d7e8e666f52b32d42f61786166344ba8ab3d4903014f06
-
Filesize
872B
MD561431a01e5b938150978c09090521da1
SHA1cb651f9eb524084ddbc0a5cf65f28be98462e4e6
SHA256386d26963e873c190fb4a303a0883620d1c8b7e3f7453cb68164da81528c6b9e
SHA512c76337a9f5b471c19571fc2b37d448838ff8e292de027bc0b9d3246a6c4a68146640965e14814f44848a4054e91aec6b259087bcac2e30a4d9672de5ee1eee33
-
Filesize
6KB
MD52c05586bc7b4bf194a56b35189fa0f6e
SHA10972e886f72a9163428c7023d6acc85577c865c0
SHA256007cec089aba24068d8fbbb5baa9e88373eaaa09f0cf40708e81cb54e4d13441
SHA51299321b62bf0c368727b235c164e794eff6de9b85a44f283c822f6b0bec39a27905322c1c7834e3a4fbb7890b01f0cbeb6eea178d3b814e7e6cae02a582e8649b
-
Filesize
6KB
MD5585080747ca1cb9d0d4107a21223bbe7
SHA16fbd93344e9bcf22a32ea4ef526102e812ee1f28
SHA25671d2d2871c49a803f284ced49fa38da8056d8f9c9ebcf4d2b9c0efa9b7c45cce
SHA512deb1348d65d7aa0bc70b0faad2649a0a2558888cbdfdcf74ecf20f032610099186ccd5b08593acff2b6aa28ad23377818209141ee146c79a1e43822b4f8d7a9d
-
Filesize
6KB
MD5e63cc9ebeae5c974397c0ed475716da7
SHA191dc6c46f7b736ee33db56c333937ff3e5e978d7
SHA2560d6e2c470f144f8631d8b804192eec93ad2784bfa6360beaa46a4ce1cf86d8c3
SHA512b3601ea16a3765ec1a7baf500a28b793cc0d47c23808f41438497adf546140ab50579fd5d4b89ee3d89ac8ddbddfa0cb0be7f85620befdf8fca41349eac9af32
-
Filesize
114KB
MD55322502859ba8529d27a7511d811c72a
SHA19d1f9b6c2aa03813cc5dc34da766edec1246c1f9
SHA256ff0fdd12527dc62f0d69cf72e6a298eb1aa8f11a98b34ae076015983a3bebcc7
SHA512b372e68ec66800339e2aa865f589c7797eb1e9d3e6d0aad744376493d6540df99a6cb09f437153e85003aa8f9c99d14e2bcebb91eebdb30760d459103aa544b0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd