Analysis
-
max time kernel
309s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://performancemanager10.successfactors.com/sf/learning?destUrl=https*3a*2f*2fjetstar*2eplateau*2ecom*2flearning*2fuser*2fdeeplink*5fredirect*2ejsp*3flinkId*3dITEM*5fDETAILS*26componentID*3dI*5fINCLUDE*5f3001*26componentTypeID*3dCBTCOURSE*26revisionDate*3d1690862820000*26fromSF*3dY&company=Jetstar
Resource
win10v2004-20240226-en
General
-
Target
https://performancemanager10.successfactors.com/sf/learning?destUrl=https*3a*2f*2fjetstar*2eplateau*2ecom*2flearning*2fuser*2fdeeplink*5fredirect*2ejsp*3flinkId*3dITEM*5fDETAILS*26componentID*3dI*5fINCLUDE*5f3001*26componentTypeID*3dCBTCOURSE*26revisionDate*3d1690862820000*26fromSF*3dY&company=Jetstar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535566154773273" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4388 chrome.exe 4388 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe Token: SeShutdownPrivilege 4388 chrome.exe Token: SeCreatePagefilePrivilege 4388 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe 4388 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2496 4388 chrome.exe 41 PID 4388 wrote to memory of 2496 4388 chrome.exe 41 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 3268 4388 chrome.exe 89 PID 4388 wrote to memory of 2632 4388 chrome.exe 90 PID 4388 wrote to memory of 2632 4388 chrome.exe 90 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91 PID 4388 wrote to memory of 4028 4388 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://performancemanager10.successfactors.com/sf/learning?destUrl=https*3a*2f*2fjetstar*2eplateau*2ecom*2flearning*2fuser*2fdeeplink*5fredirect*2ejsp*3flinkId*3dITEM*5fDETAILS*26componentID*3dI*5fINCLUDE*5f3001*26componentTypeID*3dCBTCOURSE*26revisionDate*3d1690862820000*26fromSF*3dY&company=Jetstar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa122e9758,0x7ffa122e9768,0x7ffa122e97782⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:22⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3888 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 --field-trial-handle=1868,i,5972010869928562816,14836106555080059539,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD57e33b305dcfdc8974c6b297798c2a5e6
SHA1df70163bd8d95aeab574af0363f78d3c91be85fd
SHA2568e1ff085ce0787157857949ee804ee2af2dd189b3b3472551e0ae1b35179b271
SHA5126d4cf53b3f8b88120f1870291db3cf8d43742430a9fdc13f3559b0933ad8ef791f098570341449da4d195b6983657a8916ffa73e5001be53d39df3a38b9851ab
-
Filesize
1KB
MD5bc52fe8c981bf7ce1100eca72deb71d8
SHA1f1e1b31689fdb8496f4260e05299434461b07eb1
SHA2560468d03a28ee4467512a48ac73b63c2c52bb8080a1726826daa03918e3ce89f3
SHA512518d9a99978cb6d3876fbd68170520fa740a34bc7ba95a9cc43c5e39d3b3b991a79ed7b7414259ea28562f544e1452e3ed6a8a2c29b48b6c7c381ecf2cd02f1c
-
Filesize
1KB
MD5a06b58de7945595935861591349dbc4c
SHA198196c67c833eab1360a7d6556a2c0b253383955
SHA2569758858644c51476bec244026d765042ca20fdc6e9a87ca091ea4cfaafc4f3bd
SHA512dc5d297a952315666980100905d36cf572ba309950afe378712c2b9494df9d8428426d02d81cda0ca86fcea05ebf380824dd7e93e9e1debcdb2a275c398116cb
-
Filesize
873B
MD55c6f37996e56e2aae30471d0afd24545
SHA163887ff4853f1c5f9076f2c9ef92eb36d584fe5d
SHA256e91d06f4b6a1cea62bb84fcad6cfbac86afec08f2797b21f5576c86302495bf6
SHA512e8c359ae3c7fa00630fdb4062fa51988eb80ab83c0099ec3ebe92dcdfff9a7b1faedf252814c22753538ad22648e2bcd115e9f93b42b8438be4279b87d228d8e
-
Filesize
6KB
MD5ba9abfe7b4e9dfe06ee77cc572fa1331
SHA1d0250a63927c0063dc80f0e25d3fa464682e4a8b
SHA2563dea469118599876a0bb3887aab6eaa08d3490d07ee324993bc6934b8d0de3fb
SHA5121d80871271e9f3e677ba8bc9797016da715f9cbcc0559fec06ddd18885d922b5ae4731d424b1f23f867b80beb46291da1fc6a8c05aaaa1041f86f53f3f8c5749
-
Filesize
128KB
MD57b98facc288b68eb5ba6d7454223ec25
SHA1a243c85cd4b5e66e2ca7cb5e1b0781458228deed
SHA256f149a7c4cfe235d70ee129f4221f613af815d6df75c7c208b69638dfc6e941f5
SHA512eb66be049eb2ba16fa54a3feda7ecd6265b33922a72d48bd8300f665164b97b895c468174bc287356b9514b3238070760c6c0d905ab7f99d213f84092f1ad459
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd