Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 13:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crypt-single.sign-on.password.land/XTk4xSDc3Y1pjcFQ3TEhEM2g2OGFIV3RrTXpKWGJlWmxZdWVyUWtEQ1BKa1F5N0t1RVZEZlFHMS9McjUrRGZHcUkwU29vdU1VRUNycEV6alBRVkt6ZUIwaStUMVdqeXFCUFZubjY2Rm8wcVN0dW5vVUZVUXlBbU1IVW1HSG1xa08rb2RBSkhTV2JBb0FxTkRIcEs4emkyR2poNktBR0dUL3hiRkVoajk4OXFQRkgwU3NYWU9BWjlDaG5uM2grb2lWZ0xsejVxTT0tLUVQQ1kxR3g1Z01MQlVqUzYtLWhDNXA1NnJOUWZmeXZaa09PMDZlUmc9PQ==?cid=223943957
Resource
win10v2004-20231215-en
General
-
Target
https://crypt-single.sign-on.password.land/XTk4xSDc3Y1pjcFQ3TEhEM2g2OGFIV3RrTXpKWGJlWmxZdWVyUWtEQ1BKa1F5N0t1RVZEZlFHMS9McjUrRGZHcUkwU29vdU1VRUNycEV6alBRVkt6ZUIwaStUMVdqeXFCUFZubjY2Rm8wcVN0dW5vVUZVUXlBbU1IVW1HSG1xa08rb2RBSkhTV2JBb0FxTkRIcEs4emkyR2poNktBR0dUL3hiRkVoajk4OXFQRkgwU3NYWU9BWjlDaG5uM2grb2lWZ0xsejVxTT0tLUVQQ1kxR3g1Z01MQlVqUzYtLWhDNXA1NnJOUWZmeXZaa09PMDZlUmc9PQ==?cid=223943957
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522198953682869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3412 1756 chrome.exe 84 PID 1756 wrote to memory of 3412 1756 chrome.exe 84 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2192 1756 chrome.exe 86 PID 1756 wrote to memory of 2712 1756 chrome.exe 87 PID 1756 wrote to memory of 2712 1756 chrome.exe 87 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88 PID 1756 wrote to memory of 4032 1756 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://crypt-single.sign-on.password.land/XTk4xSDc3Y1pjcFQ3TEhEM2g2OGFIV3RrTXpKWGJlWmxZdWVyUWtEQ1BKa1F5N0t1RVZEZlFHMS9McjUrRGZHcUkwU29vdU1VRUNycEV6alBRVkt6ZUIwaStUMVdqeXFCUFZubjY2Rm8wcVN0dW5vVUZVUXlBbU1IVW1HSG1xa08rb2RBSkhTV2JBb0FxTkRIcEs4emkyR2poNktBR0dUL3hiRkVoajk4OXFQRkgwU3NYWU9BWjlDaG5uM2grb2lWZ0xsejVxTT0tLUVQQ1kxR3g1Z01MQlVqUzYtLWhDNXA1NnJOUWZmeXZaa09PMDZlUmc9PQ==?cid=2239439571⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d9a89758,0x7ff9d9a89768,0x7ff9d9a897782⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:22⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1744 --field-trial-handle=1840,i,6097776630041601008,13361382602240918151,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5c44e8411c1b8d2bb190faf262d8a9833
SHA1e3e0c73faefea5e2738dd9c1175c6eac26807446
SHA2562857142d2da2af7c6dcd851f9b610c03bcc0cde87c27ffb30ee6685ce48821b5
SHA512dc2f6b6730ee66535f5acfb29a543453fcfe07b1c306e079226d0d550dd2c46f235df1a390990d98a553fc45048225fbafa22569e4fc18c4d1e25d6036198c04
-
Filesize
1KB
MD54a22cb1ecef6789e2baaa78623873564
SHA13c9fb8f8dfb2605c84ad7f29c988bc124ed8c11b
SHA2569b71e8ceee8aef7cc8a58b98b49d19dedaeaaeee840434f2669b206800a5a687
SHA512c7a9b36ff3e4ee5342b3c351a8d348ae4bcea74986ce80349504963b831ee72f93770a22e4a85a8e35989ab5896ab962aed1c819710b214473422b4f54bdadfb
-
Filesize
1KB
MD504be6561b308d893eda0d3d74f8d45cd
SHA1fea2443dd22af22196b8e6e5b2a15fec41b0b850
SHA2561cdee5aa55522a45fb5d657ca96aa00848ed99239fdf25e27763664ca973f5c4
SHA512df6e4ecf402dbf78c5679cb69d5100384d697ccc3ece46a17fa1b74aa9df5ef9aaa9288a458ff555ba085a2009d0e0aaa1b80c52720af352f371cbdb4d258732
-
Filesize
7KB
MD53402a4d7fc82092d10d9c18ff8a237b4
SHA1a00c11682afcca2feaed9de83a519edd14140030
SHA256d8046742dea43613f02a397ee6100125a49de9c8fed7358eba7dcc2a95ab7a18
SHA512436cec1c3d8dee214d6a0f1c4b0ba4a96bc25a423816d3a35f5cc7b02c745d9b1536f2f1bf5f8888ac39455f07c7b0a19a39f4f4817c27f8ee1bf7e6c12f313b
-
Filesize
6KB
MD57bdd164c6a3c78ffc84731ece478ff8f
SHA198d17c697b9357b5e0c90c1f85e3cda6d0b78896
SHA25609d90a9bff6c2c08fe14f1b84a79195cf10f7b7160cb81df49654ace2eeff8d4
SHA512b06398860142c45d29d23dc24767eab1f966a75a8dd3bb7419f5d358bad98916f127d518c2ebf4246775744c4d582bd32a5b2fb6f60261fad00e07c8766cd5da
-
Filesize
114KB
MD5b18b711ce48dad3ab6ca956d71c9b41d
SHA12e008096fea91c4500b3913e8d35d1fa0e8b5707
SHA2568c5671972feb572cf224ea888e2f47dc7a1491f16e26bbf6b75c9b8bd11dca09
SHA512cf1ea56abd8bbe53ca1cd2de52e8c37639918c7219a5b71fe2853173db7056c62533520c116d306d5bc30502319a1e423d33fdd7f9d9f1ec70ed4a035eee18cb
-
Filesize
114KB
MD5da4aede66a545b894b521940fc482cb1
SHA18be9c19e20ddc134bde2f29ff067cc0012ca9c7b
SHA256bfcc2387f52fa5c1a2f884bf0843629577d2f14614f918040bad4050407ef8fd
SHA512abea42ee65e65ed7865990ca26213185107b9a34398a3bea716c7887d98b2088e7dc5f6d9f56cb8a69da5552cda784546aabfd793a6cd9537191795688d4dce3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd