Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 10:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://keynotion2.hosted.phplist.com/lists/lt.php?tid=kKHcsYoeylixqXjyWHGMdQlAQocHSq6vimobXeN57GPB0OwAlDWl4pbMHvWzO5uI
Resource
win10v2004-20240226-en
General
-
Target
https://keynotion2.hosted.phplist.com/lists/lt.php?tid=kKHcsYoeylixqXjyWHGMdQlAQocHSq6vimobXeN57GPB0OwAlDWl4pbMHvWzO5uI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547998777685591" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 572 3132 chrome.exe 94 PID 3132 wrote to memory of 572 3132 chrome.exe 94 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1804 3132 chrome.exe 97 PID 3132 wrote to memory of 1648 3132 chrome.exe 98 PID 3132 wrote to memory of 1648 3132 chrome.exe 98 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99 PID 3132 wrote to memory of 788 3132 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://keynotion2.hosted.phplist.com/lists/lt.php?tid=kKHcsYoeylixqXjyWHGMdQlAQocHSq6vimobXeN57GPB0OwAlDWl4pbMHvWzO5uI1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e6ac9758,0x7ff9e6ac9768,0x7ff9e6ac97782⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:22⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:82⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 --field-trial-handle=1892,i,8325186962301078312,18231910160499492006,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:5156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b89c208196572ea64a07ddc7f1a6c022
SHA14d6490a5fb4dcc7301986a4356a65da3ab3eca3f
SHA256638feefb839e13b9d296772140d9af33f09a7e2d8421389a4b2b64d2d4f402f0
SHA512e212245ab98e068a30ce25a345f51e600995256a9d0551be2d058effc8541d3534fc60939677cbe64a545f617b28b0f224b827e016285b67d60df9077a2a68b0
-
Filesize
537B
MD58510fbf55a8355379b11240d82312ff1
SHA1731b84240486e95de1888401f94920b0183c4cbe
SHA256f491c039712d990e917d0a53cd63eae4aa0264ffa3047287eabdea775256c356
SHA512b1c220bc7e2981cceb5b090f29ff0378be4443fcbf19b30ebe9394616e0a0249ee353c0d8fe7bb58abc29b039e97692061cabc0feb479612c36e1c6bca750554
-
Filesize
6KB
MD5ffc7cfae83039e7acb192dba44b6cca1
SHA19225075b54c74e410205759dea34523fb6fea217
SHA2562c15b2aa0152660280dc0022c497d2368dd4e8c9fa9742ef5a01575c86e2c914
SHA51280f457ca1ce6eef9caff91b728da88e783a0e577782c01a4b03e0d0bb33689758653e5430d65104cb8a078cc486eeace8381b4899791650dfc090c7b5af18606
-
Filesize
5KB
MD52671e2fb0b1531b6d08b1b9347b9e9ed
SHA1c7cbe13a043cdb839dcf162ee8bc030465085610
SHA256550bef0f0e1ee849c3c10c494e2391438786a23188464c4931ed125f9a82156a
SHA512dd6f48c707d8fbceb1343f688993d8421ece6772014a43f2ba37dc2127014506897118f0e79c9e2354c39fa82aa3997051d4f6654a6e1d9b0e745d708d7f4220
-
Filesize
5KB
MD5dc3379c913a9aab31199f31833f0cd7f
SHA1de369cd4f2368a8bf6f0a5ef8dfe8777fdd99855
SHA25609d8d52a1c428c602129bb200eb59ca37815ca3ac8040a15225129b8570d6008
SHA51272807454d6caad233fed64c04e895c1621c44916807f676d1483894ba61ec935359eeadb766ac8a97e0b4d127be53fd97cd392baf761d88daa01f658dd06c02f
-
Filesize
5KB
MD59da7c0709d8f4bf7592add754815b11a
SHA15cfcd519052fbfd539f4bdf95620e2c59419e819
SHA256d7b045c7dc4d0aab8d83166ee3c0d9eb319c38b8d946be8f94d12d52766500e5
SHA5127d250cb929ac7dcb1146279a022de8e87e8b7b0fd953d6bebad85a458f956af0c10aff9ced92635110b7881273247e9af82b84693d6f5a2319fa8cfaf3f5fc9a
-
Filesize
128KB
MD5efd89c840d752d30adf9825af12c3b89
SHA1c3c035a64b8991f7dbfbe46c21fd083174a4da0c
SHA25633c700be81996835378463720bf23f208785330a10e7e4bb93ab1c5ed4c6db00
SHA512ef9a497d93cc0a5b529fcdd382bb21ab98f9ed2d48c12df4d58c7b4fb779494a947b1a0dc5fb7e42ca0bfc8a690e2115a3bad20e71d7fa791724daf825ae96d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd