Analysis
-
max time kernel
89s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 13:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cdn.mcauto-images-production.sendgrid.net/c2a8689fab4130b9/11e69383-3a9d-4854-8f93-037b24b99615/494x65.png
Resource
win10v2004-20240226-en
General
-
Target
http://cdn.mcauto-images-production.sendgrid.net/c2a8689fab4130b9/11e69383-3a9d-4854-8f93-037b24b99615/494x65.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543792596754721" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 768 chrome.exe 768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 768 chrome.exe 768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe Token: SeShutdownPrivilege 768 chrome.exe Token: SeCreatePagefilePrivilege 768 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe 768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 2004 768 chrome.exe 89 PID 768 wrote to memory of 2004 768 chrome.exe 89 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 640 768 chrome.exe 91 PID 768 wrote to memory of 1924 768 chrome.exe 92 PID 768 wrote to memory of 1924 768 chrome.exe 92 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93 PID 768 wrote to memory of 3148 768 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cdn.mcauto-images-production.sendgrid.net/c2a8689fab4130b9/11e69383-3a9d-4854-8f93-037b24b99615/494x65.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda279758,0x7ffbda279768,0x7ffbda2797782⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1872,i,17713549931018690129,5366346122984150089,131072 /prefetch:82⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e27d9175f45f32a576809736e129cc08
SHA1b0722e59ce72cd7a6189edb42e7f7d6ec3d3eca6
SHA25675afe76482a9c9482aa248dedda5d35cf6d2f0e2fee8b7ddac71762322f5de77
SHA512075649d92e77f57ade1e5e2bff7f53c503a46e98b2d68563e55728ddf935b339c66a2f7e2e02eafb9dca5449ff622b1cab4c6f27fd4f3727c04e04bd355bf283
-
Filesize
253KB
MD592fc7080800df70c7f6730dd3538fa5b
SHA1ff6d6727c7852dc77d4a2b258fbb51b645dd1c7b
SHA2568e5cab6c607ee716261fca257fcefd4faec09388a3ce05a80d81d6e56e6b5ab4
SHA512a7dbecd3b26e1d63b8a85cf6bf30f6006c0bdd3308133823195a00e1677680f939bb4f4126a924c62759eed20b09ed8d201fd2000cb2297d5ff03900069d7abe
-
Filesize
103KB
MD569994b1a4b763879604a94e148eb47c7
SHA19c47be6e1adec0cff29c7085f1f051007765a8b1
SHA256d6e7a419f90d961bb28b737dbd73ce073b7f2737bc8e106c04061a2cd5843529
SHA512141ac56e966a2731ef1115a199848014facfb6ac65ae362240e8f33ebee7ef9af5289e55fa19571b3bb16a0c99e69ac2e18c7b9fbcd0af564dc8b71b274cb46e
-
Filesize
102KB
MD53b857b5f610ef69dce72421a4887bc0d
SHA1a37dfb5a4772ece1ca15104b64e51f65112d2902
SHA2562a6a10f188085d2b39b279e9a86f5354ade21e4384b684facc00bcafce8ebf9f
SHA512d04b0f074a70493b56f5a6145ecb18ac8d88064960a4033b36d0b2f56e41d49a8497cc97062391a851af7a191bdb31339bf72834bde7756110f3c9ad031a7be0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd