Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 22:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aka.ms/JoinTeamsMeeting
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://aka.ms/JoinTeamsMeeting
Resource
win10v2004-20231222-en
General
-
Target
https://aka.ms/JoinTeamsMeeting
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512989519864391" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 3188 4164 chrome.exe 84 PID 4164 wrote to memory of 3188 4164 chrome.exe 84 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 1304 4164 chrome.exe 88 PID 4164 wrote to memory of 3672 4164 chrome.exe 90 PID 4164 wrote to memory of 3672 4164 chrome.exe 90 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89 PID 4164 wrote to memory of 4460 4164 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aka.ms/JoinTeamsMeeting1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d9c69758,0x7ff8d9c69768,0x7ff8d9c697782⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:22⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1848 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3996 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3244 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5072 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4600 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 --field-trial-handle=2156,i,8826246344727666215,15102098885472682924,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5f09462c7a83966d1c2b7ba287a331fdd
SHA1aa360a2b9de8d3dfb6fdc2a89056c9178cf59703
SHA25684e4e335c7944071323f726ab1f372666976d8c19fd932e98cd1332a0b6e878f
SHA51293e91c6b0f892657370f57b5bd2a5c202e20f5e42af4d67f2cc84bd044232ee981681b0cc5bef521df267adc35f8efa26f41b5f427cd2b702ab7bb3d7442076f
-
Filesize
2KB
MD55d0419b121ff4223550708c26115647b
SHA12da2e2942986cb73944a00d45262f3b2008e9421
SHA25653284dcd40f7bafb832d442394d61c7c928c956d8167bb3b7bbca4a526fc411f
SHA512e3335eba4fa2e4886fdfba57eb18c64563dcba00ea6dcb6ecd69eae9b6ae640a0674a7370a5ebfea1f7aab9a0881fc2585a9daab6323e6257b88ceb6ea38356b
-
Filesize
1KB
MD559c549489e0b1bafca7de9dd64f70fc1
SHA1e3a9f4d7e056211469c34a1d3d99988e540f6e17
SHA2564990b9adb6598b7bbe9e228e1f7d7a5b76ae3e6651abcf62dcdc7a80486d30e6
SHA512c80130993d4b59b7aad5783588e31be9ce7204b4f99cb525fc170c257cd06aacc24dff5a4801981084dccbc770c47469eb2919aca5a56689cdf304342def550a
-
Filesize
1KB
MD546a2d699297b820e4f1834cec4cacf5f
SHA1de2d24dd53f44e88dfa220e1981237c626ce3bfe
SHA256937dbdf6744c1fea48a760c6c2219810ef9a74d8a80241af077c0dd5b9db3aae
SHA512adb14f04b186c89b88a012b270d82da3a03204ece9211191a6294d53b6a10cf546839191baf4ef075ddc6afcfdd3a9b8a4b75205c2536779277f523fad6f0a2d
-
Filesize
6KB
MD5fd1e1333746ace77db2f184432a23722
SHA1886ba393f529651e3be642e3ac29fad267e72fe4
SHA25640b38cf9ef9c4cc4ba11b546cc92304ae8428b1e9f1d071935254518d98656a2
SHA5125556f8a718c569e36b1a24e4eed0c7f156ec17369a4623d1c24ba2253aa67703ef471fd1a864714dd707b0e5e603b0ddab3aa253e8e8855a8a106b9f10a5335c
-
Filesize
114KB
MD5cdf15bd3abd5ff44ec7dbb835b124b86
SHA1e7f03b7574f37dd8838015b95ae521f9700a9acf
SHA256aad6d3a512d6cbe0da8cd7fc3f246303cb2a2e31971a17a055901956daf52b67
SHA512bc7d98980e9bdc4ed017d6a7f7a6d6b34a7d1e97cc5a60ca02216a09580e3ada163ebb4318ba781c99f644f7d56adca1d1fb1b805ba13304d6e577e9ee290ba6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd