Analysis
-
max time kernel
301s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ncaircalin.sharepoint.com/sites/MyGed/SitePages/Document.aspx?document=FORM*20DOA*1.011&documentId=17091
Resource
win10v2004-20231215-en
General
-
Target
https://ncaircalin.sharepoint.com/sites/MyGed/SitePages/Document.aspx?document=FORM*20DOA*1.011&documentId=17091
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133521887286802214" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2096 4896 chrome.exe 83 PID 4896 wrote to memory of 2096 4896 chrome.exe 83 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3572 4896 chrome.exe 85 PID 4896 wrote to memory of 3240 4896 chrome.exe 87 PID 4896 wrote to memory of 3240 4896 chrome.exe 87 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86 PID 4896 wrote to memory of 1392 4896 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ncaircalin.sharepoint.com/sites/MyGed/SitePages/Document.aspx?document=FORM*20DOA*1.011&documentId=170911⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbea0a9758,0x7ffbea0a9768,0x7ffbea0a97782⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:22⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:12⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4704 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3588 --field-trial-handle=1860,i,17078377929323247063,9956515759569081361,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5e8ea920a89e9c671feca15b4bf600fb5
SHA159bd1ebd021085a828ec1d2837208ae2a0c1a684
SHA256af4faa211b2ce94ec288cfe9f3d69c31622dc746a9d25b5792ee1ea54ac5dc61
SHA5123524d32476dff5f350b1492c5fcb80010087f4395f76f9c23044105d2e0ede0c5cdaf22a06f06c8eb7a6d1d8e45c8d4f20f02b45289f111e496736555dafa530
-
Filesize
1KB
MD55cad4f465ace7c38f2f583568b408816
SHA156e243e5ca3bba46f548759120677dfca1a019fd
SHA2560336f842e2e273e0957022afca966a1da143098b3e8f3568e38a017106065bf1
SHA512e285b4b3d8700f2bc9551aca984ca2ebbbde9d15794c58316afda8db7dfce3deff02e0110c46a9af71926114a88d03ac726c6f627492b93a022cb60083cd6793
-
Filesize
874B
MD5347e3ab58625f873077234de7b09a9fd
SHA10e5ccbbdb877f5917fdd396a7b2da9c93f7b032f
SHA256402469bb166907da3b62c4e8813e43be9f2577eb4914e14565ae3e09b0532355
SHA51264242d614d71a29753589f26f91af827a30893b8068172f69586f677a91a2a3ec64c644183cbd3f3c3263453b4287dcc41bc23a39465cfc8c5f659175f6e7da2
-
Filesize
6KB
MD5888c1950838c37b3b41fcdd2b3bbaa22
SHA12f39c5ccfff527160e8d7de657fc53380b04ca46
SHA2560c3d32f17af8e0b302f7bc7ac4a595801ca8589671a6af83217a3d7cb46e365e
SHA512cbce49c95600bd23364893ae09cee7234094055375dc3faa28eace46848a94e00c4b661071e3c29f185256012f94d785db0a393d9092610c305c2e57bbb7c747
-
Filesize
114KB
MD5f7e0d6c7eee71172b9e83ea0f9fcba37
SHA1566936540b430498cea22cacfd4adb153c64e06b
SHA2566a4a054f49f47e148a4fe2e7f8d41bec8502efc08444609f08dffb3c686d6476
SHA5120d3e26a5a42f47bd93c4bc4679aee18c9413cdfdfdb243cf3244d168f0dc11b20a720e4f8ffcd4d62a5a284a05c4665c04805a8f5b0079f3e8e663d0bfad7601
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd