Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cloud.com/content/dam/cloud/documents/legal/end-user-agreement.pdf
Resource
win7-20231215-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506778351385627" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 4848 wrote to memory of 1216 4848 chrome.exe 84 PID 4848 wrote to memory of 1216 4848 chrome.exe 84 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2876 4848 chrome.exe 88 PID 4848 wrote to memory of 2480 4848 chrome.exe 89 PID 4848 wrote to memory of 2480 4848 chrome.exe 89 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90 PID 4848 wrote to memory of 3068 4848 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.cloud.com/content/dam/cloud/documents/legal/end-user-agreement.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8ba879758,0x7ff8ba879768,0x7ff8ba8797782⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:22⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:12⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4796 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3932 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894B
MD57e22924eb9a3744c716168dfbf20ea3e
SHA1b7b4b58702f4ccfead673bae5f0e00da8072e504
SHA256c3c367d71d3efd9a144bb829b19f5e456e36a3665a8bb7a092630509044ec40e
SHA5120f612f6230c032d5bac4e09d5975a00735d4a588ff7203561c2673de11375f586628dfe4a6ce37dd0fcc0798fb196aab3a686afb773850200c9320eac7ac9bb6
-
Filesize
539B
MD5bd54b6d3df6373fcbb62f7b7de049eb0
SHA1d974b415cc476ba9243fb67dc131f81f8c741a3d
SHA2562f507d5ef8932ed41492afd44d32325061de630764f0ad85248e728d09627274
SHA512fba42b0f85bc2bf815291c59e104cb741446669ad2cf9a623b1d94068dde9d2aa480c8a29f1ff0cac186db00d8f0509a25917f25df4e5d9632dda9bd00ff5743
-
Filesize
6KB
MD53c7350d602d6c6ef6d6444c8a80d8c15
SHA1bdcc864f02336324fa94a59d481d7480f509b570
SHA25600fb4cb1bf00903ec7feb65c57d06b13eb6e27b59a808855dddd13af0a59ede1
SHA51247cf1d355fa8a02c96032cc365f11939f28753b62c1c330a9392a98ee90dce92df5a5fb7d9680083eecee23c53c44a9f47469236c53b0f61dba6e7f891f46077
-
Filesize
135KB
MD512ff79be0d0c36f68f103848abfead4f
SHA1dc6f4b698cb2933f92c69df1bbf9885c36d2f003
SHA256600a77b7b955af4c8f8a3c25d66df10382268ba2275c5e0593938af1244f6f4b
SHA5127c09ea4d2ee884b555818c6c41a02d409dbee6a5f24283f3894ea2e6852bb9a7f309e39c26caaf1c8a58bee714a5e93a86a1aaef8b4aae300df769f97955066f
-
Filesize
42KB
MD5ed853ddf2b9cd8b39d222af4157930e4
SHA1760376d6083913c9270ebdcea852af85a652cb3f
SHA256435d38e5cf257f2e40b08bb1b93a08cacd99040eac1df1c4ce2088c7c34f64a6
SHA512b6c6f9ac0be5a33a4c189a0c0b25fcd19498d344e6af803c1e12301a866acb639bf0fd20f088128508192b5c91818217253cbbbede92dfb0c7ef9084d79020f3
-
Filesize
115KB
MD513db601073ad5f22eab855a8c7039c66
SHA1da4597883d81b917e8e403fbc7a1e49349683274
SHA256cb13ca7b9d8d3f4c5704c36b86e262853a42d26305bd06d979b134ada8181614
SHA5124ac384bc7e6cd493294908565d2b3173c03d018d4691d4c999dfd25c229e585d18caebf30c034277cb816fa4a991bb01f905dec5272613bd59e0d69ee4c35e83
-
Filesize
116KB
MD54b64e8fe9f44b4714be1926b5c1338c2
SHA1ad11bc85f9f162007eb08699dfd50772d5636be5
SHA25676bd925d97feefc62e6b27c1b53c4d4fc5bfc7b06f2abec9693b3b20cdc393aa
SHA5124a2c573d1ad3170780fe8d51d952371068f505e9970db87fb39ae8be5cf44d43309a46955372146858e116cd12ecb4692ced63badad795983a08eb3384157e66
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e