Analysis
-
max time kernel
32s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 16:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pocloudcentral.crm.powerobjects.net/PowerEmailWebsite//GetUrl2013.aspx?t=TEka9Gzp+UWz6rVgaDAhSUMAUgBNAA==&eId=03e02621-4ddf-eb11-8150-00155d010e03&pval=//automatedsetupllc%E3%80%82com/#ajOtbW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=??kypxg44fhlrkaixdobr=bW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=/..=BWjRd&u=276b8dda4ef94158348d5b6b8&id=6b7205781d
Resource
win10v2004-20240221-en
General
-
Target
https://pocloudcentral.crm.powerobjects.net/PowerEmailWebsite//GetUrl2013.aspx?t=TEka9Gzp+UWz6rVgaDAhSUMAUgBNAA==&eId=03e02621-4ddf-eb11-8150-00155d010e03&pval=//automatedsetupllc%E3%80%82com/#ajOtbW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=??kypxg44fhlrkaixdobr=bW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=/..=BWjRd&u=276b8dda4ef94158348d5b6b8&id=6b7205781d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1080 1716 chrome.exe 17 PID 1716 wrote to memory of 1080 1716 chrome.exe 17 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 3128 1716 chrome.exe 88 PID 1716 wrote to memory of 868 1716 chrome.exe 86 PID 1716 wrote to memory of 868 1716 chrome.exe 86 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87 PID 1716 wrote to memory of 2920 1716 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pocloudcentral.crm.powerobjects.net/PowerEmailWebsite//GetUrl2013.aspx?t=TEka9Gzp+UWz6rVgaDAhSUMAUgBNAA==&eId=03e02621-4ddf-eb11-8150-00155d010e03&pval=//automatedsetupllc%E3%80%82com/#ajOtbW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=??kypxg44fhlrkaixdobr=bW1pbnRvbkBiYWNrc3RvcHNvbHV0aW9ucy5jb20=/..=BWjRd&u=276b8dda4ef94158348d5b6b8&id=6b7205781d1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce9a09758,0x7ffce9a09768,0x7ffce9a097782⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:22⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3904 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4748 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3112 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4996 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5252 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5780 --field-trial-handle=1948,i,3034026453017788003,18124990363970750998,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD52cab82760bd0cffd25657c42f5916003
SHA1534172176f5e4da3882d38ac228b212e47e94b3f
SHA2565829b1b469e280e65518e744065c14dd66c901bfd5594343776fd461d7b4be88
SHA512cc0bf23b4c4a8db1a3ddfa020918d68e12210ba93cf3c75f0e4eb0aaa9db0c3e99f301e9a4febdcdcc192b2e5dec24c1542066d489a2dd8da7d96ee3ae3e6281
-
Filesize
538B
MD52f6540af9c766ba8d61b0d64c5919752
SHA1450b6aa92351f5d2788da74aeb1fca434589fe1f
SHA25691717749a7a658527598c96503e8d5c12b0678130b3f30776874161db7c06033
SHA512ccdcdef4e33d1faead76c716386877ed2abb551fcc7fb12140aff5282f16a5c12ebdc769b6bc34389d7abee53c83e5ae8b059d70655becf1fcbe9dccda9b6476
-
Filesize
6KB
MD5ec0df8455a5566fd9f94889903ed8d36
SHA1a08e231a33de3da30d280ee1450c3816b8e1c597
SHA2564fd23a7ea3b7c822a14ab20a6e67b9f4577f3ad0b6494290cdd15b3ed4503bd8
SHA512bfdc48ce098a0f25e7f2072a5472fe4798111820c93a73314b9d7448692231a7d32ce40c857b275ece8aaeed6b21cf3a98d0a42ef9c2071525e370a53d720ecc
-
Filesize
130KB
MD56093c9abb2a7fe811075a895b7066d88
SHA122f768ca5b75cd6dc6909b7f740fe98f07d4c4e6
SHA25698f578f4bc8ad5559cfde930ee0136b7da6420e71a0424dd00f7ec5e88a1c68c
SHA5129293b53a169da4e6243855553d12085922330d549d47977beaed7a53cfb7b0de12d64e67b4ab8556fdb59d63f0df344d1b8ccc648481bf538e5c1ae799fe0766
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd