Analysis
-
max time kernel
15s -
max time network
25s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
06-03-2024 05:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://micd-furnish.uk/cr.PDF
Resource
win10-20240221-en
General
-
Target
https://micd-furnish.uk/cr.PDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541766128605687" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 512 chrome.exe 512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe Token: SeShutdownPrivilege 512 chrome.exe Token: SeCreatePagefilePrivilege 512 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe 512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 3768 512 chrome.exe 73 PID 512 wrote to memory of 3768 512 chrome.exe 73 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 64 512 chrome.exe 75 PID 512 wrote to memory of 3556 512 chrome.exe 76 PID 512 wrote to memory of 3556 512 chrome.exe 76 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77 PID 512 wrote to memory of 2932 512 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://micd-furnish.uk/cr.PDF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb05ed9758,0x7ffb05ed9768,0x7ffb05ed97782⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:22⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3804 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3132 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3596 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3044 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3040 --field-trial-handle=1752,i,13248191488270208486,11603759790072969852,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5219fbc7aa98e4c1f6451310a8e529201
SHA1d35e96bc830c297a5015ca9fdec446c787d4f6a9
SHA256f7fc881a6a1a2e48031a08d19ac97e3c8974bee0ffcb14b0f68cc0d51884700c
SHA5123ea5a53863fbde218a50ef6c3f964c12f6906967ff71375c46a8003701d19577f8b80ac8d49e93b2b9d37c56177193e255ecfe868355127ff9a2169bc0da210b
-
Filesize
5KB
MD50894f9f11abf60b10812601d79610e9d
SHA1f69af8344dad041e4f8e4b81e971dc947bc58afe
SHA256de12b6ca29c69a4a3de97480589c4964ae69ebecf3d581f78bef206f5b318b04
SHA512fe008498347e7ec05a79add0c36d19f295ef3f960007d423a304dd8a7320f09cc7e2e2529c1f63638819328a598e157c3bb9235b43a887f9a2a8621284b16482
-
Filesize
5KB
MD5d63cbfc7df56b5b661d7298ac4483e32
SHA127f37e965bb224fdfee2430785756c55d019601a
SHA2561e837617c07f9a88064761312fe785a8c762a12058f8521da4a4381f9d0b7bae
SHA5124b9bb7c483820dcf2c76703173614ba2ca68950bf451b4cee1857d4ce5efddf370fbbdfe76d214bd3239199c1779083ad7898b6cc6c76edab3a3e447136af10e
-
Filesize
130KB
MD54d16fe98da85cdcc9df890e00d885574
SHA19f3a33a8bdff24facdb02fcf96a48cc4ea9735e2
SHA256fdc59abcec1f0a62f3c8cbd275ea343c4ccb1bc1bd1e19a4496c7bacf647de92
SHA512b7b760cb906a5b44acdbbef18e23d2229d424bd2223a922395908b3a80ce46bb04df6a94646b5de5c774efde0abe8c656c8b7384f0ee0e4d2438e905c174738a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd