Resubmissions
14/03/2024, 00:06
240314-ad7pysde41 114/03/2024, 00:05
240314-adlsgsdd9z 113/03/2024, 23:59
240313-31vywsdc7t 1Analysis
-
max time kernel
42s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 23:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=1887248764
Resource
win10v2004-20240226-en
General
-
Target
https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=1887248764
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548479868719369" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe Token: SeShutdownPrivilege 3300 chrome.exe Token: SeCreatePagefilePrivilege 3300 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe 3300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 4172 3300 chrome.exe 88 PID 3300 wrote to memory of 4172 3300 chrome.exe 88 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 1368 3300 chrome.exe 91 PID 3300 wrote to memory of 4044 3300 chrome.exe 92 PID 3300 wrote to memory of 4044 3300 chrome.exe 92 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93 PID 3300 wrote to memory of 2756 3300 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=18872487641⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2a89758,0x7ffdc2a89768,0x7ffdc2a897782⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:22⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4728 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 --field-trial-handle=1884,i,9085810910956866058,16395610398378105152,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5f457c1cee74f0b1d104f325ce9a2e25d
SHA1ef5806ba65caa20d7fdeb7cdb7d3f3bd8f3d6262
SHA256bf68460062a0acd0671462fd72a8a92b30df9fd8332964878bdd3819e2748e68
SHA512ae7d9f6414b7f1e91572b3443b5932cad356e234cce6d8a16332f2ebcb5f3fa7d6627ad9444e5cd8e0782cb0d1e7ebd6f268cd2218883bb6f82fc5cd48b1f8d0
-
Filesize
1KB
MD529c276afdb3d536890acd5b251b3d9f5
SHA133acbf087f5c976853ba837d57a65c2b7bdf29a0
SHA256e8fa8d07e9a00e76c5fa716196bf89ba0afa6917c437259ef5386518ff6a9ef1
SHA5121cad5e998e36781ea971904dac270427f895d38ac5231381ef2f5dc9c561f9e093902e40179f408b495f5ec8250c852b3e3ba2226a101b7b60bdde9975127fb1
-
Filesize
1KB
MD5940b886858f30afc10e2e3fc5f5703e0
SHA10811c16eee9f262c189abefeb26d6925940ea1ff
SHA2568590a60401df169f6b3621d5e1ae4bc06587e2a50f71d8af006441ab8b58176c
SHA5122ce04f46b68e4a2e28775c63fe26b1bc5b8f05ed4bf6575bc636faf7c3a8da35f46196cc8d9809721482e630960df6edc902fad0632aaff4e12f4adf2a5a8dcc
-
Filesize
6KB
MD56d81514717c713916d9fc000ec24c653
SHA1f5c513fbd4acfe9dcb3af6f350e51ddb16874069
SHA2564297b4c61f1c81552a458c19023f0f8a34bf8ec51c2480faa0c82143b98af269
SHA512a521e6686d357a989bff48682e2b5f35cd98174983811411ea13b20ff05ef2498e24b46fb39da64402f67beab4ae3135456df361a37f6d1b7f2d6b46d2b82412
-
Filesize
128KB
MD504b4a6a0b77c0c088e5b49e4cb4571e5
SHA1c504b9ed178a354036f8f501c17cae1126498b0c
SHA25618917a0b60039beeac69b4bcd952af69347b0f0f923355d45c2658308762c02e
SHA512d0b62b95bee301575a6da735f878b557c5409146c1287f8bd59914894b56fc0af9194260f0e68d499fd156c4dd8629c85f9c563a66919c0c8b727e6a66cfc17f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd