Analysis
-
max time kernel
389s -
max time network
364s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 04:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ulenterpriseorg.my.salesforce.com/servlet/servlet.ImageServer?oid=00D4x00000676e4&esid=0184x00000FiOzB&from=ext
Resource
win10v2004-20231222-en
General
-
Target
https://ulenterpriseorg.my.salesforce.com/servlet/servlet.ImageServer?oid=00D4x00000676e4&esid=0184x00000FiOzB&from=ext
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133527895857950064" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1164 4932 chrome.exe 85 PID 4932 wrote to memory of 1164 4932 chrome.exe 85 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 1640 4932 chrome.exe 87 PID 4932 wrote to memory of 4992 4932 chrome.exe 89 PID 4932 wrote to memory of 4992 4932 chrome.exe 89 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88 PID 4932 wrote to memory of 4944 4932 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ulenterpriseorg.my.salesforce.com/servlet/servlet.ImageServer?oid=00D4x00000676e4&esid=0184x00000FiOzB&from=ext1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4a089758,0x7ffc4a089768,0x7ffc4a0897782⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:22⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3300 --field-trial-handle=1816,i,16287315426151582468,9345950164872779790,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD57e098e4bad82bdac604f27be251c03a2
SHA13f5acf96b0b6f7a12514a3a9ed9c044b23f294e2
SHA256db66af7c84af858913818a7947767985cb6005aa8dafc0d7d2e860c3b6e7ed3d
SHA5126108685e32f794c738c43451f4fc36ab7fd00123c6e64beb5818f460f2da165d5e0ffbf90499793648b138eeef470331168d1fdb7b5e1934d4f07ae21c8f75cd
-
Filesize
538B
MD582ad8ef07e8454f8c14692c2d53094cf
SHA19866b74272a738c3b7029b964ee054143dd0b42a
SHA2564001c0bdb776e4bb91fa7571e7f3185dadd04e6eaff28c874ba23b559089fe4f
SHA512c16dcb8eb668ae8b5da5c19006f56c85145ed893e771ef9b31edd4ce14d79c5d9562db32a46e3050279a6cb76ac4a4f74978f97a6c69c38ffe324127f9ea47fa
-
Filesize
6KB
MD55cb19bc669b43ba20ff8c46a4031761b
SHA1f997094d3b26264c0751ad12322bbbfbb3b8095c
SHA25647e09d33dae41caadeff8fdf07dc6bb508de6ccc99fb252c25261fed632f7aed
SHA5125e8aa7268a4492a9971b8c1e16b6907851a6aae5ebb600abd2e42909420385da87c6d16742b11b62209811acbf5077d92d3a0116a2440a34b179b7a72ec205f3
-
Filesize
6KB
MD591266eceab48d9b2ea4603d87559fb21
SHA19e4ca576e598f572fbf2a36a82abdf8b44796abb
SHA256bba2c5e72399a2dcd3d8f2e70428b739a61a632977735aa4f032a68be6283b37
SHA5121bd34ec1e68e8edb0e71e36156165a755da21606d5d86bff6e687d335633cf484f5964aed16e95741294d35a5e2802118154718fe7dd74c86e67b149c856b6c7
-
Filesize
114KB
MD53a99bf00e65525ac38111af39b420f7a
SHA15bf0b3e9be09047420edaeebec4d4413b4b86fca
SHA256fdc8fbd68ec3e2cfa0457d92176fde0a7269f85b2a0fbb100888a11fe4dec344
SHA512ae93e2b7c9c0f300e6b6cc007f0ba4894cdf957191dad007e7066597a3cb8e40e17ea7e7ba2034a310f4f8b565374e41740923991f8e711dfa106341b62ff732
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd