Analysis
-
max time kernel
299s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 04:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.learn.internationalsos.com/e/er?utm_campaign=APAC-2024-Q3_RODeepDive_Climate*20-*20Invite&utm_medium=email&utm_source=Eloqua&s=1158236727&lid=37753&elqTrackId=B62BF6E69AF674350F3C96B18E9B3267&elq=d0339748c2074c9c927f679a982f8f74&elqaid=34732&elqat=1
Resource
win10v2004-20231222-en
General
-
Target
https://app.learn.internationalsos.com/e/er?utm_campaign=APAC-2024-Q3_RODeepDive_Climate*20-*20Invite&utm_medium=email&utm_source=Eloqua&s=1158236727&lid=37753&elqTrackId=B62BF6E69AF674350F3C96B18E9B3267&elq=d0339748c2074c9c927f679a982f8f74&elqaid=34732&elqat=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523570393294667" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4804 4044 chrome.exe 85 PID 4044 wrote to memory of 4804 4044 chrome.exe 85 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 4932 4044 chrome.exe 89 PID 4044 wrote to memory of 732 4044 chrome.exe 87 PID 4044 wrote to memory of 732 4044 chrome.exe 87 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88 PID 4044 wrote to memory of 4776 4044 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.learn.internationalsos.com/e/er?utm_campaign=APAC-2024-Q3_RODeepDive_Climate*20-*20Invite&utm_medium=email&utm_source=Eloqua&s=1158236727&lid=37753&elqTrackId=B62BF6E69AF674350F3C96B18E9B3267&elq=d0339748c2074c9c927f679a982f8f74&elqaid=34732&elqat=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa4709758,0x7fffa4709768,0x7fffa47097782⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:22⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:12⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=928 --field-trial-handle=1992,i,15913268000099779518,4018364653617692398,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD531b583c2ddf4a141603aa67bd8baeb7a
SHA16dfa07b1c38d452afdcc36bd0acfcf40735841e5
SHA25634ce2598a9f77a94c5f2cf7888242c39f2881206fbd7a74600c22136334aaff3
SHA512ee3de62a9f3a7cf965ea98250da38edc18cd5bdc6a8fb05269316066b971075588152e06415474baf5f86df6597c2ea8c2d3350acb39166b111e59e362042a9c
-
Filesize
1KB
MD555eb7db71b135d8b685ae23b931c07b3
SHA116635a2f85e8079c8fe70d51c47dbc4cc5a2ea37
SHA256b48b2be405b5c53188fad08326fc0838c9006386b88ca035f71e4ee37f5e7f21
SHA5127d1d7023f7966a925f31fea7b51c9d8ed83d9457479e40f69ba519c4baec9772c342c2cf7c48ec0017bfd1bf68c00a94bd97b5ca30c4c7850a85fdf1b45e83b1
-
Filesize
1KB
MD5adf8279229ef2ddc58e715f931f92b88
SHA1b23ae5c507da3ce90a9e190ef4687554008554e4
SHA25674dd6fcab109b713b666fd8602742adb425872e5827681623d6b6941ad3b1a3f
SHA512892e37259daeef84beb60ba7cb4a8219a055f1615ad74c000780a53a575ab7d7b9a6ad1795aa261cb9a54ce01c6009b66c4fe754201636415ef235f8adbdba09
-
Filesize
6KB
MD54778e48204dba076f27077612646236c
SHA1b80f3c50e87df8f22ef7a67f16c33b2cdff7a2fc
SHA2564fde552bee1e782471151ff66d08cbb7a45daaad35a6abf766420ee8155b9705
SHA5125c0d7fd95157585f094295251dbcf002f8608c006f6acde6c55e02a4639722ee5e850ad7fae20dd4c5cb725bcbfa035412bd58c74e3204d133b0f424b620e80a
-
Filesize
114KB
MD595b1091230358a35824bb38485c3542d
SHA14c69d93941d3920247e30f96fc0a52190d16044e
SHA2569219062133d6add77eba2f420df56bdd91625f9470a5c348a90855844aa30cd3
SHA512359c2d86f591ade71fc215cfba0a6d8579d0721db28a93ca91e407bbd1ba3307c777f0908c5eeb666a300a0a5e6d034923ca0a1a0660bb1cbd24993cfea5174a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd