Analysis
-
max time kernel
300s -
max time network
277s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 07:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Resource
win11-20240214-en
General
-
Target
https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528889329765482" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1908 3976 chrome.exe 29 PID 3976 wrote to memory of 1908 3976 chrome.exe 29 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 992 3976 chrome.exe 83 PID 3976 wrote to memory of 376 3976 chrome.exe 84 PID 3976 wrote to memory of 376 3976 chrome.exe 84 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85 PID 3976 wrote to memory of 972 3976 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.vertexinc.com/e/514851/confirm-email/hqz5rk/1303085677/h/o1oxgqwopZLIDLSsehO74tnjAMKCvPbqiu7MtehOt9o1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0xdc,0x118,0x7ff9a9019758,0x7ff9a9019768,0x7ff9a90197782⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:22⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4792 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4680 --field-trial-handle=1812,i,1162521176827237139,8806076203563219713,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD52ba6fa7bec2e5d6667c2e3c68e348739
SHA1426dbb8962b1f2a81622fd365a12c0316e9861d6
SHA2565fb39198d1bd9138cb920d4b891afa9f1069df6e6361db7bc39781125fc99e6d
SHA512929a35a1f6464e2e363cf3a799aea042e54bfab96ae65949b8ca992848787b99e4fcc8a2f34d9f058841c4a770101bc918105a782007e0c80b6861347e2fb4b7
-
Filesize
2KB
MD5dc2378015e56e4eff5941a86b25da66f
SHA13662c90336323abbdcdadeadd66a9e695fe16052
SHA2567bb3f906f7b8edbdb709c72aa1af4a2099aa0e8587fdbafaee26f246fb7cd1bf
SHA5120a8f73f81a9fbb440b64ca8f33bb82a67067226209b1b474366e4b743870db066875360f1d323bea69d86987d464dc1d595321744de04285303c2765d6b5e856
-
Filesize
1KB
MD58e9c9dc1a411613bd1366250c31dee5b
SHA113258754d3ef67c364bff68cbe328675c1624c64
SHA256c19609cc38f1caf7b9262a9570676a3f5e9456070904e9d52cea7cba387965d0
SHA512b0d43a53b3ff502a3e55889268f7e482a2e24e3a0208d13a43eed29160d088cccdb9cdeba21568abe3b7185d29027ffe9921a00001eea31f882173f6945d69e0
-
Filesize
6KB
MD5159caf2d2c2be65747defb846f97cea2
SHA119522bd5d4528c5008bf3a83f1e14f84f33d4345
SHA256c1a3e5ba51e1f8b9ad35a5d925cff7918325f5b804f2a95c3132a1572d5abb9e
SHA51217e9875c1549523f665bdf143c71aa1be86b743b225e2d355cea11b7c6775981c81cb5b0f9694bddf067a1dafc75e021b08728367688befd3a2c28055e6172b6
-
Filesize
129KB
MD5e391ee922ad85715e13c5e5714eb020d
SHA1b65722c5f9218dd4366bc2bcb42e79614c2638e9
SHA256efdac2781c8ca68019694e09267f4ca813d009466790d70650c7c1d48714f743
SHA5123a471860d891e1432b4f5c7777dae23a8c66ace24903e3f7dd57d67e5a61f37cbe8cb07cb4875b1e78aabeb7f567b917b62443f760b7e2b10d52d6650edba262
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd