Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 15:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mail.medgate.com/wf/open?upn=u001.zUjI-2FnfV4P3ZI3F8MzPSGx-2FQuLdtEMVmCuIHvdMV2f1T8DaF4WlRdGmuI7VG7S8tNUlhiT-2FCNAP6w0xZVP-2Bt0XbbEho5A7E31mEN6eXc1eURs2ebMC-2BQRE-2BnU63BipYcyVjsn4A28krrigrdvd7rD4tu7Go6yNuSNTyp7XaP37GVCxuwBwf3LbkOl8TuhOvspQNujQmcWZwKzPawhOWdMOjdu-2FjVuYoszMykO-2B8M3vo-3D
Resource
win10v2004-20240226-en
General
-
Target
http://mail.medgate.com/wf/open?upn=u001.zUjI-2FnfV4P3ZI3F8MzPSGx-2FQuLdtEMVmCuIHvdMV2f1T8DaF4WlRdGmuI7VG7S8tNUlhiT-2FCNAP6w0xZVP-2Bt0XbbEho5A7E31mEN6eXc1eURs2ebMC-2BQRE-2BnU63BipYcyVjsn4A28krrigrdvd7rD4tu7Go6yNuSNTyp7XaP37GVCxuwBwf3LbkOl8TuhOvspQNujQmcWZwKzPawhOWdMOjdu-2FjVuYoszMykO-2B8M3vo-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546440327793714" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 632 chrome.exe 632 chrome.exe 5132 chrome.exe 5132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 632 chrome.exe 632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 2124 632 chrome.exe 96 PID 632 wrote to memory of 2124 632 chrome.exe 96 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 944 632 chrome.exe 98 PID 632 wrote to memory of 4544 632 chrome.exe 99 PID 632 wrote to memory of 4544 632 chrome.exe 99 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100 PID 632 wrote to memory of 540 632 chrome.exe 100
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mail.medgate.com/wf/open?upn=u001.zUjI-2FnfV4P3ZI3F8MzPSGx-2FQuLdtEMVmCuIHvdMV2f1T8DaF4WlRdGmuI7VG7S8tNUlhiT-2FCNAP6w0xZVP-2Bt0XbbEho5A7E31mEN6eXc1eURs2ebMC-2BQRE-2BnU63BipYcyVjsn4A28krrigrdvd7rD4tu7Go6yNuSNTyp7XaP37GVCxuwBwf3LbkOl8TuhOvspQNujQmcWZwKzPawhOWdMOjdu-2FjVuYoszMykO-2B8M3vo-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea4379758,0x7ffea4379768,0x7ffea43797782⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:22⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2776 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2784 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:82⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2880 --field-trial-handle=1932,i,6855193543366543509,16895432283882310323,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:6064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59ec51c01c6fcd12c730b71488ba03393
SHA18c950801cb4c0c0dc3f0ca5d726cb904201327c9
SHA2563836dec5b938022c29eb195c4dd245e7edb91fe8d5c6f8293353d6318f3c5ddb
SHA512a2ff1b343b3df9eee74fe384c46ffaa6573d59c101d3ab984182b55f4c597257afacd21f7b147a15ef3dab748a4a15cda76e89af6f35bae63e4c085f7dfc664f
-
Filesize
6KB
MD533e1ca2acc529b5849e53ae7d3f9184a
SHA1ec97c5acae9a274ccea6a74a6b8f8a5593a69881
SHA2565dc245a71fd55d3923327cfb2255e23374a02048e11d3110758026298fe7bb7a
SHA5123e06cdad8b9c0e07357fa0c53e2a41d82a47c7591700953df741ec8c7a73b147b8f9099ac8820258a5871816100eecb05e6289d7c34b07d1a224efe14828b79a
-
Filesize
5KB
MD54b0b67251aa7f6513107a3ff9bcdddf6
SHA178f423aa5097fc491ff1877b819e84fe8b643494
SHA25631a6d4617bef44a80283c148383d5ff431abdcd221969ab5aab2fdfd68c2b96d
SHA512d1e8d45be726173936eb8933d40167ba5a867c4bdddb54dd95db08ee0801dc1af681367f2e6f18dd39bd1236678f28cf0c3b25df045422b96aee7af900eb1cd2
-
Filesize
128KB
MD526886582bb21edfc12d841c65efde282
SHA125cf1f2e82c9bd318dd71a63dd0f970802179096
SHA256015444e43c8bae0397573a09a9c709bca2f34ff489768f1331c0c8701a0b8c42
SHA5126dde6c9fbc28ff8468dc850d583261d70570e1259c49ebcc301ed10cddee8055a7b971bc23bbe3fd7a24e8412c5adfcfd0ef1439118817b8e02ad205bc143d9a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd