Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-es -
resource tags
arch:x64arch:x86image:win10v2004-20240221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 21:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ertkiogh-jdusf.formstack.com/forms/ec
Resource
win10v2004-20240221-es
General
-
Target
https://ertkiogh-jdusf.formstack.com/forms/ec
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3548 chrome.exe 3548 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3548 chrome.exe 3548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe Token: SeShutdownPrivilege 3548 chrome.exe Token: SeCreatePagefilePrivilege 3548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3548 wrote to memory of 3844 3548 chrome.exe 73 PID 3548 wrote to memory of 3844 3548 chrome.exe 73 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 1092 3548 chrome.exe 88 PID 3548 wrote to memory of 3316 3548 chrome.exe 92 PID 3548 wrote to memory of 3316 3548 chrome.exe 92 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89 PID 3548 wrote to memory of 3588 3548 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ertkiogh-jdusf.formstack.com/forms/ec1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871679758,0x7ff871679768,0x7ff8716797782⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:22⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1884,i,8985891437088443226,6274332329684646271,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD59b7282c24b337355f24ac6a88baebae6
SHA18ddd1c90e3f7e0786809e9a4790e2aea822765e7
SHA2564a1d9988ced98d4966c8e8e1f4b9a63254bb975032fed6d06ddea7762b467145
SHA5124d58b106cd0150a1f810104b73fb391d2b52ae623738ca4b8b17dfcde224686012d7e4d7cbaa8c7593b6cab024cbb09e2685f86238f8085b0a0a3e9bdf1f1350
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\4b859030-2665-43e6-8eda-1cecd402bdae.tmp
Filesize1KB
MD5b161f446424bd145561363546b601bca
SHA1e916555f72f964d979a701104a210751cd8e9b25
SHA25633615b41e652f3864bf412fddec7b289c8bdbcb4a060b70f658f5256caddc70c
SHA512270f1ff6676225d875de340c4babcaf01e8b896631ea1e4b7cfede4f521d235de2f2fdf1905a15e8679e7821ec515b62ab3c37934db0d54c3677d0dfb553ae66
-
Filesize
706B
MD502f4103075233c8257ff537c282ecb19
SHA1d77c99238a48cfb8fffa1e8632207448f485e364
SHA2562fe5200c3bdd63acb3542de217b6743c4467da99934eba1104f0b3b2b52e803f
SHA5122b0a82e4a096361c904ce2c1cb22abb99484f6d96c1c218b1b9f4043371ceaa70a43889558874427bff97da2abd7593787e19e8172a7a05a03c10fe85057adca
-
Filesize
6KB
MD5f69a53d08f707d809a25a1ec979a01f2
SHA16dad2801a281ee94fe947da78fe10a2090727bda
SHA2565fb637ef951d4f671b7297319cdd16aee538406d7f47630772e9259a056dcc67
SHA512feb61c6900afb49df66d434daf94a3ae50e9ba50988d26790d32e624462c621971ca3d399fd3d250fe6b94b56db81733955ac923dacfa34aad8e365c507ec6b0
-
Filesize
130KB
MD534de5a402f7f8e1c5a21abe6817c19df
SHA1dd1beaf47ef2dd3b90d9b8d03517a3b82a0566f0
SHA256b02d26d26f9a7998f556eea3b30fa7ab9642661e5c0a95471c98ab93584cb53d
SHA5125016fbfb95d4310cdd939768b181529d11ebf3a70b140e8f98baed62eb48d7b6f2c017f848d4f5d055c01e72c06ac6eca8d0c9b57766433d8df696c93d801557
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd