Analysis
-
max time kernel
210s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 04:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://au1.documents.adobe.com/public/reportAbuseForm?tsid=CBFCIBAACBSCTBABDUAAABACAABAAcFZL6lp2scsNvH2fkp4Vm3fttxy7SJes3f2tj_WgPhQQ4xPn6JotKvcAvBA7vXwp7OoIXf48I7yeeSEyqLDWiKig8-o46SDvvkk7D57O6AbcsTvbp7m62R2-dUaKviJ4&&reportAbuse=true.
Resource
win10v2004-20240221-en
General
-
Target
https://au1.documents.adobe.com/public/reportAbuseForm?tsid=CBFCIBAACBSCTBABDUAAABACAABAAcFZL6lp2scsNvH2fkp4Vm3fttxy7SJes3f2tj_WgPhQQ4xPn6JotKvcAvBA7vXwp7OoIXf48I7yeeSEyqLDWiKig8-o46SDvvkk7D57O6AbcsTvbp7m62R2-dUaKviJ4&&reportAbuse=true.
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3152 4868 chrome.exe 83 PID 4868 wrote to memory of 3152 4868 chrome.exe 83 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 992 4868 chrome.exe 86 PID 4868 wrote to memory of 2312 4868 chrome.exe 87 PID 4868 wrote to memory of 2312 4868 chrome.exe 87 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88 PID 4868 wrote to memory of 2112 4868 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://au1.documents.adobe.com/public/reportAbuseForm?tsid=CBFCIBAACBSCTBABDUAAABACAABAAcFZL6lp2scsNvH2fkp4Vm3fttxy7SJes3f2tj_WgPhQQ4xPn6JotKvcAvBA7vXwp7OoIXf48I7yeeSEyqLDWiKig8-o46SDvvkk7D57O6AbcsTvbp7m62R2-dUaKviJ4&&reportAbuse=true.1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffcbf09758,0x7fffcbf09768,0x7fffcbf097782⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:22⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3448 --field-trial-handle=1700,i,12849453902597955570,11963436630755966704,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD57728a7f9895a10da8dbf76c2cd8b7010
SHA13079c754915fba2c5505a51c313663013ff8126c
SHA2562426eaae7122403ac1c5ba758fd19da325b0567e55fb255bfaf08c14f96d621c
SHA512b5c1ff9ff880d7d519fed8a7a028b6abf4cae37b09781304c49204b39ec2431585dbd4cbef9fae0e34d583525873c85baeeaaa699234d5706705dc689239a986
-
Filesize
2KB
MD567faec3a35401934b5bfeb65691c034e
SHA12814c01b98be37960f5d0ac604b692f73b74a89b
SHA256913a78eb58e276529336eefd461a27dacb16091bdbe1593dda90505787b96295
SHA51246f3463256bac2d563d32bd50ddd4250db9bef4eb35ff685e913aba952797c2ed24fc8de45622891f09c9ab0d13571f6bcd8260da802ab993557cabf300779d4
-
Filesize
1KB
MD5a942741a3ef11dfbffd17e21f8a75ae0
SHA15740545635f320ce22f6c23a4ef85c5f2feb5dc9
SHA2568bb8db9f564efa78f642b0ec5f3d59aca075b7ed11440d3251dbc395bd092f4f
SHA512552cb07c56fe2ab932f8b09978043c45e8befe99b8ee18a8f471037971a1d1b829b6a722cddbebe8d6bf61e3f84c6adcb0671499258e295c4e027ded15940f1d
-
Filesize
1KB
MD564acfd88fabbcd547685d506bf2fea1d
SHA17d2e7d46907fd248ba63c9d49f49c0e1016ef5e7
SHA256fbc324cfa311e004515fddab6bf8f1d470babe823e6ec3a54e6261a85d2bab7c
SHA5129e094620b05c48b4892b16c9958cbd90cf11c9bf14ad252c52d681742f42573c61a046fad575a9d4c5926eb7d49629af76a807b11ef334440e51de0835f0dfe2
-
Filesize
1KB
MD58d62d34fdcd2cf041f1108439adef5c6
SHA1f33d16d2fd48a15f15efd7e870086ddb51ace011
SHA25698a1ed5330ed80c981a0c24ced9455245936cca5ff3c6ee499ff2b2040da72cf
SHA512652635d81c1f37a66d57d3b3d2f278c3c26207f913934df477186a8fb55c38ac36fab072a1e8dbc24f4d53980fc2fde9da994f425969d30e9ac2d7965d7289f7
-
Filesize
6KB
MD55ef76ba8a4ec183d853e4b0eeabfe32c
SHA1325cd92d2e2ad7bf408ebb75f024a166c38ffb6e
SHA256aa6d9a3efbe6ab6e64420de12ac3e9bf0c7379595eebedec1e6edfa8bad1451e
SHA512e35fecf5cff76d3c5ce68ebd91aea2c50768f30b415e4550406f3b391a7c9e0ec5cbf666c1c77aab1d3f90880e0ce2c76a121fd5e4124e8eeec794eb0863f107
-
Filesize
130KB
MD5b73e729ab9bf7a4180771779f65aac51
SHA1d0a8cfdc071c31c8c6092a4c15dcba069f584581
SHA2562d5d0892adada757e2749ec5f25793eae2be55d47f84c06f0f2d5a6e777e3a15
SHA5129110a1a0126aa5eb0d1f1e491683ebdc6e2f7ee5d41c91ee8aeb84186202d0ce3a97d3c3d14ba322b5f3e1ee97a3c6aa35f09e4d2e06c329b136e8961c22472e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd