Analysis
-
max time kernel
302s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
20-02-2024 07:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Resource
win11-20240214-en
General
-
Target
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528889424815730" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 5072 3572 chrome.exe 72 PID 3572 wrote to memory of 5072 3572 chrome.exe 72 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 4288 3572 chrome.exe 76 PID 3572 wrote to memory of 2916 3572 chrome.exe 74 PID 3572 wrote to memory of 2916 3572 chrome.exe 74 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75 PID 3572 wrote to memory of 3808 3572 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff7edc9758,0x7fff7edc9768,0x7fff7edc97782⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:82⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:22⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4824 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 --field-trial-handle=1832,i,3976448188414032314,12864210739344786553,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\64271807-88bc-4297-86d5-44e529c57f55.tmp
Filesize5KB
MD5ab2e25866a070996fdbcdcee89627bf3
SHA133b83f9adb3aa07711e3a47ca7a1b1955fb02418
SHA256c0bcfc246357b2f7ca0efeddbe50bfb4b6cd4213aeb52eb88a1ff13f8cfd32ca
SHA512a28a5a20a1aea8af5f4dd4b17e3d71c6aebc305946e6bea50b013555c34527cb456d531c35631ad71c4be9635c3129b9b1831383efd5ac7022c328b23479ea61
-
Filesize
360B
MD5a8446d87eadac5c6f311ca24dc8d940b
SHA14e4dfa6549e3dc781fd8bf8b38f0007af25ea05e
SHA2566cdb9494d90573e9032deb0b0229d0d2c80c693342a18e1f7dcbc2ed55681e74
SHA51268cf389e9278a76ffd7d9a9e792d7ea6b635123fb0da5cca21bda7ce18d3e31d67275deb4e74a100c34b171602e846ce1ffebecb6940d06bd403acb11422cdd6
-
Filesize
2KB
MD5f795af814984756fb8376e873e284011
SHA16b7dc29aa50cfe5086952a73f02784be3b0b12a5
SHA256f25991c9a68e2ebf044b346ba91aaeeaf08ea5ced97f1d9e9a8312dba86614ab
SHA51215eb5bc4260ac255a012438e25305cedd4a7bcf265e0461f36821a6d1c52ee06c484aac365265350884b856fe649a36ef199d56cb52803fd35aa83e3a3568f55
-
Filesize
2KB
MD527ffa923e269a621a156b08ac4b6b4c5
SHA12e20fdbe0ab8e6e6268f922d2e15f1b0ead9c5a5
SHA2560e624fd3ab5961a2dc75e8a2723de7ba4885f0adf4251e1a67ed3f33934309ac
SHA51296c0210efa77c1c29a5b09a09f692bd166a33b4775815a89bdeead10256f9a94e5bcc5b7442959528c09c46e31a94e021fe21c51aa735fb33fbd3749d1eef4d7
-
Filesize
1KB
MD5f45d8ebe5a7c19b15f2d8a301bab8d8a
SHA152353231d80f3244c450318e9eca6dc523ec893b
SHA256d0749b1670b94f20c6bee4d9d2eab2e3338c9ff21aed68d3aa9c7bb91e267481
SHA5126839ab5768a5a18b5a4980009cc5b1ab0a1bde48f12ee2649be8bd41d3c252bb8201f862b9cf8105b06190ff07d77ac8adafa73e0f1f02fe4ddb6c42b29488bb
-
Filesize
5KB
MD54a086ca6174209e9fe707905e3147787
SHA17c148d3f8eb93c0a2dd5799e57d15060706532f3
SHA2562adc630138188141fbea48b5c74c381b48bc6f91b348ed947070134916987f42
SHA51247d472db0d1a9cb0bbe801e8b5c817fa8cfcaebaa6f0369fba0c44763d47c301f5d7eb1184bd8ca59c843295bbaedac3c779b9f603c8072cc8cf901cf02beaf1
-
Filesize
6KB
MD5d8f6ad914ac16509bca0687d4209c824
SHA174a9b92719eb811fd1ef7bf17af83b3ddd54ee47
SHA2560adc12a10a8ccf1d2322d56b67310c5a9e4887d149a55f1f72aea36cbf44edd0
SHA512aabfbff62ff80ea2e53b73a1ce98c5c53403bf068b5558d731f7ca0bc46288a3902fedf6e6a80a0af43fe5c1e796959e2e41f3c1bb8bb838bae5fcd0d66e6057
-
Filesize
129KB
MD50caed93c567c34bc30fd5c46ea626518
SHA1954fbd01e8dac9e7875fea09254f07891262d76b
SHA256eded706f2108d0c6e492573aa09b440204706bb6cfaca24f40d7a94e9433dea9
SHA512e8b9242638e4062bec35ee32a992258848948c8a941e5f5c145757780398b0dbde3ea3dc4801c21eb279636b23ec6227dc02269d280b5f07f9388ffeb559a0bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd