Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 04:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rmrbenefits-com.jmailroute.net/x/d?c=39602649&l=068262c2-d5f9-43e2-9db3-6be4a4d11e09&r=4c04f0ab-93ff-4480-8643-603c68339fc6
Resource
win10v2004-20231215-en
General
-
Target
https://rmrbenefits-com.jmailroute.net/x/d?c=39602649&l=068262c2-d5f9-43e2-9db3-6be4a4d11e09&r=4c04f0ab-93ff-4480-8643-603c68339fc6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547773419458550" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 3668 chrome.exe 3668 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4656 1856 chrome.exe 85 PID 1856 wrote to memory of 4656 1856 chrome.exe 85 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 3168 1856 chrome.exe 87 PID 1856 wrote to memory of 1112 1856 chrome.exe 88 PID 1856 wrote to memory of 1112 1856 chrome.exe 88 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89 PID 1856 wrote to memory of 4816 1856 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://rmrbenefits-com.jmailroute.net/x/d?c=39602649&l=068262c2-d5f9-43e2-9db3-6be4a4d11e09&r=4c04f0ab-93ff-4480-8643-603c68339fc61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe221a9758,0x7ffe221a9768,0x7ffe221a97782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:12⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5060 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 --field-trial-handle=1864,i,12759447025768801674,13241942925399304064,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD51f4886cc224e2c31348a738e29e191a0
SHA1549f9c3699084b24cf13d8d3b1badad714f565b5
SHA2569d6927024c55eea3b4d759f4b6c82d689ed5fe6d858bb3561ca4792483f310fd
SHA512f212863e2eea7301977197c122520e520d5a96d309f3fbf5af2ffa5c459ce7cd11c0857c0c7dc26255efbc802b1ab97ac98e6aab52cfe9b840a042a34a429336
-
Filesize
1KB
MD5560e886e18bd9c66f951ace914d8cf91
SHA12c89c54eb3236090a89147f317e2c4720824e640
SHA256962c5a5232edb1580edcd107b8da4157d600ee7d9fe17cb5a84e66b0268034c1
SHA51239312acc5e91843e6d870bd5ffd7f89803f148a6bf1a800021fb17794e98a083d859dab64e832ea91f6586aabeb53edd437b360c10a84d5ed7b8e18254fc114e
-
Filesize
1KB
MD5e6ab14e9c3f4bf55672579c942b558ab
SHA18a7f26cf2d60ce6fce20fd4ea21c1502e8ad49c4
SHA25698fc18e9b9fdccf7e5eaba5a27b328e379fd7fdc5c6b59d350d9ab73758428c7
SHA512220a043f49bdf20ef8f271476d8635ffeb08d98c0a9c9504058f51662239807c44469203a4debb4ccfe254638057dd8f465b8b66c8dc28d8d4bf44b97bf12d9e
-
Filesize
536B
MD523954e2318c83dda3a31f7185ab760b8
SHA1f95b979434c46e982ca992c0fe09f4cf2357bdfe
SHA2561683e440cd8e1de50b7c4e1c935ff791e56ecf18e7e22edd3daca1bec3f7bb90
SHA512fa3fce3bd823f4a2392d6e417be522de00d597aae2442d9da6d567081f6b0d1d09ecba3b56c61ef64cb8194aaca88cfd1266c57a54e28f89001e694d7518efd9
-
Filesize
6KB
MD533cf00fe4384d4237d088bebcd0ec2ee
SHA1c4db2e073dc3994eebe3dcab0b4e59f40ecef21c
SHA256f5a2c7aeba0e9222f5365b236d9c90b09623da448c15eb04b43989afe4d12a7b
SHA51203ae71f8ecee6d51fdc6c0702f9633cf40cfb135f429d48515f5abf88ebf7e0979b393a702b5c6377ea31986c6ee3fa10a35b8300a34b26f7e09e4f4957814d9
-
Filesize
6KB
MD5b629ba57d92971f8692f515248eb9edd
SHA1223011ed150916aa04522231ce827ba159048054
SHA2565becce1c7e8b84e127c8c1c1b896e039e54d9f61138784199f524d76640ab26b
SHA512fe6a1436e993120f17150060285997df373f2658284b45f50484b2c27f35d20bdb3082214625e4b21a8783c5bb8ddd6136554b8687bd2a1e1c3358d866be7c7b
-
Filesize
114KB
MD5a79afba6e4d2f054e7578750cdc3cbf9
SHA176f1a7aff46f347f10172ae0d7beaab8ff22d471
SHA2569e74091088e7a61687c1413426e223a50a744385cbedc26a13c18ef2bbd71510
SHA512dde373063feb4af90035b581296d664570d5d0c02cede54fbb3746acb6d405e6efa634daf051cf16afae70a8241f883be6caf10a9e6d5e595a40acd4d88a71d9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd