Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 00:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://svb.zoom.us/j/95822509748?pwd=R3VlOGxnVkhIZEE1NUppandUVUxVQT09
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://svb.zoom.us/j/95822509748?pwd=R3VlOGxnVkhIZEE1NUppandUVUxVQT09
Resource
win10v2004-20231215-en
General
-
Target
https://svb.zoom.us/j/95822509748?pwd=R3VlOGxnVkhIZEE1NUppandUVUxVQT09
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506156652927238" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4152 chrome.exe 4152 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe Token: SeShutdownPrivilege 4152 chrome.exe Token: SeCreatePagefilePrivilege 4152 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe 4152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4352 4152 chrome.exe 86 PID 4152 wrote to memory of 4352 4152 chrome.exe 86 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 1520 4152 chrome.exe 90 PID 4152 wrote to memory of 3624 4152 chrome.exe 92 PID 4152 wrote to memory of 3624 4152 chrome.exe 92 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91 PID 4152 wrote to memory of 1852 4152 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://svb.zoom.us/j/95822509748?pwd=R3VlOGxnVkhIZEE1NUppandUVUxVQT091⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dcaa9758,0x7ff9dcaa9768,0x7ff9dcaa97782⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:22⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:12⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5200 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5220 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=828 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 --field-trial-handle=1932,i,11114261414009740171,13439941866929762180,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD50e525f27ba5a4c4d0ebca64a61174da0
SHA1c98cb1a9b04c685dafd486c2f51023653f4e763c
SHA256d7a06ef8fdaaafedea3b522b7411bede856bb1d0f18d8b7216c20255947ee517
SHA512108bc37bb02e2a347aadb81ada4985f34fe96cf7a8c61885418a6601867289494ce4d986982fbc4752b12ee018cdb24b11d090cf38b6f34e51e72493da46ff81
-
Filesize
144B
MD519569309d3dcd2bb26094135eeb2000a
SHA14c2a7306128ac7a903fa9c9256ae3ae0961e2e1c
SHA2566a8013fd818e6ef114d2f1054cdbe5a5db46d3201404727fc44565bc37643e24
SHA512832e10b8926999cb084cb0171aad7280fcb263159fb4b70f97cb9be54dedffc1c1ea921594e7988216c7d139aca24894003aa0af1a7aa02d2e9142c9e31cdc33
-
Filesize
2KB
MD51b88260f8134ab7ed88e9047170e8795
SHA1b4309ec45a1a0e7b0b1d2025227613cb9d1a91e1
SHA2569b049dcd28533b655c36a3e0b53c58b17aaaa952df4afda90b2fd6db0989da22
SHA51244e3a47a008a23df376a488fb4e9965f5bd30e8ae4a5ede90cdcabd417e2f5447ae380be3ce2a85505f0aa42fda1fd3aeb8cb3d92fb6988403c0d94de44f7dcc
-
Filesize
1KB
MD528dcea14f6db359e1c552ff3b776d176
SHA19770e0d8b1beebafe8168cbd1f057db7bfae7c01
SHA25606641fb4918c012911bf51ea859993bd6faf25c178f4d2cfb59238a2a67a7930
SHA5120fc8bf0ba9365d98b16d950895218f439db72f8b3a9d3613552d0d6e0ab9099b1e20adecc14bf93beb0372a38c689c4ee0c173778e59f8795042e994ad9a84c4
-
Filesize
6KB
MD5757b9b4b468b0abc4f705604aed0fc68
SHA144a1c3a32c422fdb515944b9b46b98338e7a9e1a
SHA2562318530129c030de8f53afab9f421c0ad71982dbc5296e624f8042e2ebc0a5cb
SHA51223b249dd09651fd2c31d9afba01bdadd846a80dca0e029b1f4bd85d3048feac3b5c52616b6761123489497e095efc8c343798a574467896e68b9078f877379f8
-
Filesize
114KB
MD521aaa5406aaef56fbca0f98746ba6017
SHA13a434df668e2add217d73c6d57828d131a9bec04
SHA256988124bbed32705378b0fdbb9d2ac96bbd41773ed1aba85e314ff44fb411a215
SHA5127c4ef94e6ce151c48e4ea16c206c27738aa56a962bc587c91b648393ad9a0022bff1994e88d213b9408cd823c9ffe9aa0a3410a249174fe95ac47bad63c2a975
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd