Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-es -
resource tags
arch:x64arch:x86image:win10v2004-20240221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 21:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ertkiogh-jdusf.formstack.com/forms/ec
Resource
win10v2004-20240221-es
General
-
Target
https://ertkiogh-jdusf.formstack.com/forms/ec
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3708 3612 chrome.exe 82 PID 3612 wrote to memory of 3708 3612 chrome.exe 82 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 3000 3612 chrome.exe 86 PID 3612 wrote to memory of 1076 3612 chrome.exe 87 PID 3612 wrote to memory of 1076 3612 chrome.exe 87 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89 PID 3612 wrote to memory of 180 3612 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ertkiogh-jdusf.formstack.com/forms/ec1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc75059758,0x7ffc75059768,0x7ffc750597782⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:22⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:82⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1888,i,11882306085653159770,10022757551765794898,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD517c9498d16be186b825f624e09ee59d3
SHA10575908d8ffadf848748d672e08fabefc9e80178
SHA2569b0de66b1c31ae842bd590fc5b7186affffee30a2f6f7790886b69ccd4632a72
SHA5122f530862e0005b7c5338abc65ab72ac16b8becccef1f89867ea59f07000eec95d662009e48ef2c871aa58844833dbf5f6b1457be4b208882b60c15b92f93e60b
-
Filesize
1KB
MD5aff39ee1534dbed5128842f164a8517b
SHA17610da2fafd263204a7ca41a4eccb931821b3d1e
SHA256d0b5ed81621f2aa695957685ae3d9e2ffb782400effab83b83eed7a7a96e9238
SHA5120d6b6663b66990c779176bab0dad409bf5927cd2edf855d8c88d43612c99ae3298e7ed57b3000121cbaedd3a682154c22077c264874d079b67f3b854fd682937
-
Filesize
706B
MD5ff920153c741cc96d50e8f548712078c
SHA1501f4d190cc467698363bb63b6bd6f311f87c1b6
SHA256af15a5d7f6286adddf6c929f5f7b60bd7653c33685a76bac87e6c8e836a0a24b
SHA512d3d6e571af474d355679b8b7fe6fe6dbdce24985dad0469b7775da0845abbe924ecd419c5f4958052d8dd6459d47d62c86e568eb1985f271f5000aa15ec1c8c4
-
Filesize
6KB
MD5eb36351eecbc311164d154c6d2cd4b0a
SHA1ea28c703239ca3484566d94294e03858bdfd6092
SHA25623abebc99652d7f82388ee6a795be34966d8d166e9e6b947c2c114e98ad00a5f
SHA5125f078252ebc162014d9b8c7699b8e6e1d4c2858f265ef8de8bfd9a67d661ac4ab25bfb882ef694703302fa34930f02d209d7b2be785d396c9721a7ce9c92d0b8
-
Filesize
130KB
MD56898a4f2c4ec6125ae27c2c5bf8e57ef
SHA16a11d3fe447eea017ce6f1c2ad6555a378c97c13
SHA2561974d4e08931f7bfadd7e5b08853e99430e385928cd44745a93543f9107784bf
SHA5121dca97f47aabc2b5b4055dd3759dfb1c042589281ca64af1e91b40822509ae046849bd028cee1850019a524b8d53b71dd1d94a740c47ab84e4a45c4a56366be7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd