Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.canva.com/design/DAF881ZCNeI/RkAMPtIH04sG0wqO9lZ_ow/view?utm_content=DAF881ZCNeI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Resource
win11-20240221-en
General
-
Target
https://www.canva.com/design/DAF881ZCNeI/RkAMPtIH04sG0wqO9lZ_ow/view?utm_content=DAF881ZCNeI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532583929949723" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe 2808 chrome.exe 2808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1332 2036 chrome.exe 80 PID 2036 wrote to memory of 1332 2036 chrome.exe 80 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 5016 2036 chrome.exe 85 PID 2036 wrote to memory of 1584 2036 chrome.exe 83 PID 2036 wrote to memory of 1584 2036 chrome.exe 83 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84 PID 2036 wrote to memory of 1928 2036 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.canva.com/design/DAF881ZCNeI/RkAMPtIH04sG0wqO9lZ_ow/view?utm_content=DAF881ZCNeI&utm_campaign=designshare&utm_medium=link&utm_source=editor1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffecd5a9758,0x7ffecd5a9768,0x7ffecd5a97782⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:22⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3740 --field-trial-handle=1832,i,4624706589902098205,10882648196495152438,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD59d35fddda58875fd120ba47a64f7279e
SHA10b8929e61cc70e02a7ec31a6e2d5d5d7cd8b7bb5
SHA256db7af4e04c5b573ba9d558e34f6739ac727dae6955d3485e6c302a203cfd29bb
SHA5120dd3686f88ba3569c80a9e521d0ae651473133b5393540d246555f340a2815d7406a1b872c814d9a4638419cda8b56072e5e1c7b66aa4249c6b65f6cef4490fb
-
Filesize
1KB
MD5f920103e771b20b432a266383f23cde1
SHA11c728f7e6ff5cbeaf44612927d1ddd259f340de6
SHA2564704f031785aed93c5e2885c09114fdb1f91714375b79c490a37590e0f490bfd
SHA5129c78a67535ca4c1152e7f87ea6310c13b2622b3eb92bea3ea6e3d1e0c75f7d3df0a6474c1af13c31dde06efe7d64b5e243db11ee2ab7a9f998c862a36d6023aa
-
Filesize
873B
MD5ff99b7497c8168939223a7cc499d4af5
SHA13eeeb613fa584f5ea3a2bf191190918e9101f737
SHA256bf2ca16e9b7d439c2325f46c334bc12d5038994b41bd200cb709f03a30f2fdc3
SHA5129e8f280c60e52bf898dad99a0268f6079e93a432b0049dc47ff9df4d29c5ede07e0c97a938bab284aa6866928f789633c983d7a4231ece677c17d92702f1bdc9
-
Filesize
6KB
MD5f68a47c3cf79c559c881cfc0b3078a25
SHA147ccddeb1d0b72a2c5aeaf39bb995447d0a51fd0
SHA256c6a4fd5ba557832657b639ef777c77c027e91c7cdf602fd22fba2a27d676bc13
SHA5128c2abca0b5ada220fa4a52fedf22732c1d6bcf77b2fe2fcfb0b0d1004b4e56c9421ee8fe5c65967a0e552d032597f0467a3c48ac5288852272a5c7ff8514e3ea
-
Filesize
6KB
MD56c3b7b009091f2b4f48bac55236e3f14
SHA146257a0d20561e2e588ee4ebb9735c5ac5c904fd
SHA256096da54b263f76e20c5d085a29d7a2af86d13e1e2f779fe97f9479d67c87cc78
SHA512578c3d8fe5d775bb97f0373bb1c3ff15b437f8332c037208b51d14d3feee2bfb16eb3da2106bddb017b5b9f833df08fa82fdc50604448f39ce961293b689faed
-
Filesize
130KB
MD53882cd418d0ae6d2a0fbca838c7c8a47
SHA10bbf3738b154915d32fd8cde1a5a89e118125d4d
SHA256e84c2153f6d67602541b9b9329ef6b022ab32023173aa14c6e32d90c83a57064
SHA512d9b6c5a3f72658cead9f275a50876aa714d5a5d68563042d374429dedac718b440bb312241c720ae2ebcc267124a2088335e617e6cde290008e3dacdae2eb6ca
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd