Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 08:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://confidential-mail.google.com/msg/AJ05YhcXFt6JfKFzuChibPgL7t_nu-jTLpTjAH640rCet7Yx2lTvoMK7GYV2m973cQnxRSlQ44-yRpgpqFcmps9_hCRMDKuzv0HxfHVa3v0cpJYMVZelAbb1Qw5nqHfJ3seS4smYsDHycq4iUFShEV6gxAKdnfpShBuf6aM=
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://confidential-mail.google.com/msg/AJ05YhcXFt6JfKFzuChibPgL7t_nu-jTLpTjAH640rCet7Yx2lTvoMK7GYV2m973cQnxRSlQ44-yRpgpqFcmps9_hCRMDKuzv0HxfHVa3v0cpJYMVZelAbb1Qw5nqHfJ3seS4smYsDHycq4iUFShEV6gxAKdnfpShBuf6aM=
Resource
win10v2004-20231222-en
General
-
Target
https://confidential-mail.google.com/msg/AJ05YhcXFt6JfKFzuChibPgL7t_nu-jTLpTjAH640rCet7Yx2lTvoMK7GYV2m973cQnxRSlQ44-yRpgpqFcmps9_hCRMDKuzv0HxfHVa3v0cpJYMVZelAbb1Qw5nqHfJ3seS4smYsDHycq4iUFShEV6gxAKdnfpShBuf6aM=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513362157326396" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 2200 chrome.exe 2200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3616 3356 chrome.exe 78 PID 3356 wrote to memory of 3616 3356 chrome.exe 78 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 3800 3356 chrome.exe 89 PID 3356 wrote to memory of 1868 3356 chrome.exe 90 PID 3356 wrote to memory of 1868 3356 chrome.exe 90 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93 PID 3356 wrote to memory of 4952 3356 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://confidential-mail.google.com/msg/AJ05YhcXFt6JfKFzuChibPgL7t_nu-jTLpTjAH640rCet7Yx2lTvoMK7GYV2m973cQnxRSlQ44-yRpgpqFcmps9_hCRMDKuzv0HxfHVa3v0cpJYMVZelAbb1Qw5nqHfJ3seS4smYsDHycq4iUFShEV6gxAKdnfpShBuf6aM=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff96b9758,0x7ffff96b9768,0x7ffff96b97782⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:22⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3152 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2496 --field-trial-handle=1864,i,12324525981901102366,9401703403750030292,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD58cb4fcff79469008047a7d7412b5c4b6
SHA1aca2b156eeee44787dfdb82df1e94fb317bc2043
SHA2569febb8b0c29d19331aeec769a5f2bc3d0cb2e6fdd305684ea15ba3aafa9f2883
SHA5129a192dfa13c6e003608a8de3473bb2325e2da5b9ec7a549fbfa61fe3873486b93797b619ca560a5b923ff4fc3bc6712044b29edb1e76cf3e344c000976646593
-
Filesize
2KB
MD5d28d4a5fee42617f01386c98e7b54d9e
SHA1dc18eb7969ab23da8e3e3fe5306f22cd01d662a1
SHA256c4929c4dade0bfe4dea8c94ab981c3d36d892c652df10885b789afb0490ba72b
SHA512205cb8e4fa1f7552c4b6ef58d4a943dbf06fb6cf2ad730848312f874a1e2e95c29b5cf055dd26608d5a9c7a50951f126a73222ad92698d636ad871bd28864bb2
-
Filesize
1KB
MD52d348e8ef2dd1d7d917e49c7e9ff5041
SHA11ab22d0e6d665034fe445d66a19660fd25ec1f53
SHA2564011265d175845f9d7453bf6d48b319a06c3efdefa7360ebc281749a85a60ad4
SHA512cb4f2fa054100fef96634a9701f4b3f5c96f1d5eb537536860a8a0630bb3d6fcbd4eda9baf29a23c673e6c616a76fd32a1f94301f844dfb8a9e5506add8c8f9a
-
Filesize
6KB
MD5a50f9a761c6190bf432ab24cb27c8d1e
SHA1104d81c2829d40b402fa7904dc1b2321885e51dd
SHA256adf45cd6342ea08067e7186b27f58369d776acba4ed72a0dda6a5d06d8121f8c
SHA5120d6c266cea8658a55bac941eec93857b80723964646723895e295688395ef3e1c62a9e9466cd531a20bc1a4ffe5b69e72a9758fad09c9592ac48fc5fedd4aa3c
-
Filesize
114KB
MD5de2389def11baa6718919a5ab5b21439
SHA1ca90120074d9acfa10a0b705682b29664597f89d
SHA2561ac30b7ee25101906b9fb518f4547104de5c9a19f979ecc9490a3a78bb00b72b
SHA51229113e83c09c2455da84e0f0fa125bdfdc463acb5bde79758abd272f6195ba79daebc945f52b928723c779f89dcc68379aab5511822cb29023f71e360e1f9dc1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd