Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 22:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://compass.hanoverprograms.com/Account/ResetPassword?userId=loc_balden&code=ZhWpIN1+hkKJl9SxWh5WPRjarLF0AABsmBu8+ztwxyKkCLrsL3HHqTw1ewYooRq8xOVbSt3IZCNw756QcA2iroBw/q1kdAciquGeM1LqrJoOyfurLg34N0PfzmJ/61gQ7vH3Cu4XoaDrDTjt8olaUi8HqHY=
Resource
win10v2004-20240226-en
General
-
Target
https://compass.hanoverprograms.com/Account/ResetPassword?userId=loc_balden&code=ZhWpIN1+hkKJl9SxWh5WPRjarLF0AABsmBu8+ztwxyKkCLrsL3HHqTw1ewYooRq8xOVbSt3IZCNw756QcA2iroBw/q1kdAciquGeM1LqrJoOyfurLg34N0PfzmJ/61gQ7vH3Cu4XoaDrDTjt8olaUi8HqHY=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535479727143249" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 416 chrome.exe 416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 224 4712 chrome.exe 86 PID 4712 wrote to memory of 224 4712 chrome.exe 86 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 1384 4712 chrome.exe 89 PID 4712 wrote to memory of 2428 4712 chrome.exe 90 PID 4712 wrote to memory of 2428 4712 chrome.exe 90 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91 PID 4712 wrote to memory of 4732 4712 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://compass.hanoverprograms.com/Account/ResetPassword?userId=loc_balden&code=ZhWpIN1+hkKJl9SxWh5WPRjarLF0AABsmBu8+ztwxyKkCLrsL3HHqTw1ewYooRq8xOVbSt3IZCNw756QcA2iroBw/q1kdAciquGeM1LqrJoOyfurLg34N0PfzmJ/61gQ7vH3Cu4XoaDrDTjt8olaUi8HqHY=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc45839758,0x7ffc45839768,0x7ffc458397782⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:22⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4900 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3444 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4456 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5092 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1876,i,6116895721881766833,1206971498966820712,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523ceafb5615786a7a26a44046c5a62fe
SHA164cc426080131836345d19a53b0e8ab2ae72f7cb
SHA256cd7b5ce80e3829155f8dde48c4f839818980c9e2a6e032d5dd10be9f8c51e69b
SHA512080977c6eb195f7328d0c1fab6e4c5d9b26cf147f81bbad9a38226faa862024717cd79897f16ea74d001b98dfb628b852a1d451841a95ed20438d6217a93196a
-
Filesize
6KB
MD5c0975140c5654c8b439ba51d76b57bf5
SHA18997cf8208097f207d42a298df2cd9a417059d84
SHA2561ac741ae04b016cbab725ec6fdfc155596d19ed6071e9cca3c90f7bf5b0da100
SHA512f2aadc9cfd2d75f2ae1134cf8f2e8766ce9aad121f8f7a29955f66811f7728307680c93ec86447d106e0f0677aa0327e004050af6f1e3be972002c667b9be438
-
Filesize
6KB
MD5b16b541d3091f39c229ab6795026d4b7
SHA152c0752250e265786522717b723e4743b25a2a14
SHA256fe4f366affed66a25bff449c5586f486e34ce669d574bbe0e42a7774195a4f66
SHA512cf94dce08f8ccc1e2fc494b72b2edcc12a7e823dc354b7a92987746f352eadf78353796333cbfc880cfdf17b4724fd1a8692f2a2e8dc519bb805870b797c8fa4
-
Filesize
128KB
MD564c1de74ce9a2a6e33c378d46948c00e
SHA11b09f4e84d25e72f3c6313e53fe324ba9824706c
SHA2564a9a79d243ca7d5a6562522dda857782209d0cf0ff54e485389b72331a6e697f
SHA512bff218b369a58b3ccb75a50ab5e9d531ee492780318cb5be2429c97761f69c8e385b88479fc5063e7039564f2601d9267aa01020854e78e69f079af3f5287de2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd