Analysis
-
max time kernel
300s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mailsuite.com
Resource
win10v2004-20240221-en
General
-
Target
http://mailsuite.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531732053063689" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4640 4648 chrome.exe 15 PID 4648 wrote to memory of 4640 4648 chrome.exe 15 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 4540 4648 chrome.exe 64 PID 4648 wrote to memory of 1608 4648 chrome.exe 67 PID 4648 wrote to memory of 1608 4648 chrome.exe 67 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66 PID 4648 wrote to memory of 2952 4648 chrome.exe 66
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mailsuite.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0e979758,0x7ffc0e979768,0x7ffc0e9797782⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:22⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4832 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3964 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3984 --field-trial-handle=1736,i,12391579310141971930,8134792374055095226,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD58160ac3f6d2594ab8709b0860143fb7f
SHA17f87d6df5988f9a10069fff411b280e64c9b5a1a
SHA25672a9df5aaf5e96bd76e82b93a0ae731d99de05f396a184e81a50ebfdf5a6e1cb
SHA5126157e0080820199908a7586682f86e1448669dcccf35e83d0b297d6ac52c1dfb4f24832a012870af19ee3a92c6f4c95be483ff76edaffa4cee7a36e7381eb49e
-
Filesize
336B
MD516ed13746211a58faf6cb5248efb5c9c
SHA161755fa6c61841f1bfb902267c757cdddb61ccac
SHA256b9d565ff6dae6b47433aa60e897fef7dde3e20d35840255a72dcd15741b5bd2f
SHA512c475aef84cdf0b5b1433a4a443a683ea8e32201ce7be388527de3029ecee8de0ace0be4cf31e5ae0adc03ca30b58c6896648addaab3f471a7a31ee8eb516cf87
-
Filesize
2KB
MD5ab62b2652a701bd2b2091e9dd4aa9162
SHA18c00ed86786dc24b8370f71f32a7648716834d18
SHA2566b62efa255486fc6bca2a466f0798273e3b914f9277bd58444f49e7cd57c5b5c
SHA512f42062e2ff7b900c9dc89cab40e983050baf07271e6709592ff5aa368e37056ebff45fb3a6776cf90e22cc5417c1f23bcb543e8a8608efa5afb9303fe232e14e
-
Filesize
2KB
MD50e7a002d204ee018d6db829dd2d020bc
SHA1cbe3b0706a29b3ea6ad691bd54ab9897d07ce28a
SHA25660c0d39b48852cfe410d53e6e508cd75b2a30c241ff032590c987f87b24018a0
SHA5129c73d2acedf1912dd684f1d272188b892605f100f198d7d1da49f9ff7689ff9250cb591bb2c1aaeff8c19bc418dbfd8537a35eb2e918a55bef31e7469af74e44
-
Filesize
1KB
MD547690b1fe90c72d0e63d9d3ff7084d98
SHA122820e1bfa35eb4cef51aa165722f6a4c4bdcf06
SHA256dcc550bdcfa5f5a861e21ecf7d3c6c73b67f01aadb30146e69b4314ad591707e
SHA5129e40566cbddbd8f54611bbc843a4e782f92beba042a54bc039ff3a0e14e1bb26e19bf3c76a6fa3b80b5c51cd305e997f736844fa0b0dff77075dc0af3dbb267a
-
Filesize
5KB
MD5e0929e9a3e85c0d079c46fad97bf9c58
SHA1dc694d3bfbd7dcb7beb46dbdf8f788b8ece9a8ad
SHA256e23d4539f36b17cb945056f18117532330482748c5be314ff72f8bfd59cb49ea
SHA512c56a09483913c4c76dc5838c606c2605b8976020f552c82efb4479db93b4242dc687294bb40b5f8a2fdfd08b0ef6a6ccb94852b5c66e968f4e789f35f2b1ec6a
-
Filesize
5KB
MD5fc2ea624cb7cfeeece04fd42c3375de4
SHA1705ca3b6d7b968fca337cf48f49c6119b1fdfe67
SHA2567e3a7662ae6daa568d831d31a772e0c41b3b2209557eeae950b76ff3ae11ec4a
SHA5127e7b79f40b2efa547ba7bf3d34c1cb9a213a089c0e4bb33ed421954b8f0c76c61d27d9a065cef63eec9768634c51a07f1d1314856f60e29bc81da49e97033ac7
-
Filesize
5KB
MD5effcafdd4aefbffe4f18d12e93f49586
SHA17600be6038e0c0ad7fb9819ec5f262874b2161a0
SHA256e6ca28483bb8ede6b8cab18a5c356d24ae1d00ca8bf226283e96c56f5e514b6f
SHA5127bf0d6fb64887d2e9300f739f3697e38b7fb9f7a6692d8aefeb74ec46e97c7e6fe7039d967f2507fac5abd4e18df25ec619fbab91c77c53a15f22a55dbcc5f2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd