Analysis
-
max time kernel
164s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 21:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://selectmedical.clairiti.com/candidate/start?oid=031cccb6-beea-43b7-baea-ec0fdc4b4186
Resource
win10v2004-20240226-en
General
-
Target
https://selectmedical.clairiti.com/candidate/start?oid=031cccb6-beea-43b7-baea-ec0fdc4b4186
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549249725559154" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2116 4700 chrome.exe 86 PID 4700 wrote to memory of 2116 4700 chrome.exe 86 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 3168 4700 chrome.exe 89 PID 4700 wrote to memory of 1600 4700 chrome.exe 90 PID 4700 wrote to memory of 1600 4700 chrome.exe 90 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91 PID 4700 wrote to memory of 4072 4700 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://selectmedical.clairiti.com/candidate/start?oid=031cccb6-beea-43b7-baea-ec0fdc4b41861⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde41d9758,0x7ffde41d9768,0x7ffde41d97782⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:82⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5020 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4652 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5396 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3960 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3280 --field-trial-handle=1692,i,11820652205848094854,17973944362552367899,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5db8a4dff294ed2ef8e719839e0359ad5
SHA151c73bfbd0f9aeb7acafdd6691261516c9f4d3e6
SHA256329b275db78534141e6740aef50df8d1b577cc13b562142f410e13cd8ddd1bfa
SHA5126b0476b65fd860618eb1fa4455ca80d1867333bc1a883e45da75fa834b1377f9fa0330b551502c385fde95ed55d1e5bcebfb7f8514533178e0242c6f7ab81c47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\886e0da0-9e38-45b3-9c48-3d1c663e3595.tmp
Filesize873B
MD589a028c0217b48537cca059497190a18
SHA14821505bd445df36f9c1c19a175df94b78ce8200
SHA25654f9fc4727b6008618e6ec4a4fa1a800195f12eb2e6b7089e0b1391c2982c17b
SHA512bc739b4047c361b12ecf66711105f1ea2dfa165270690ca8851483f84656c2164c666beb41de35e5dbca8ba357945dad7fbc6bc946defc1b5cc3ec210869b200
-
Filesize
1KB
MD530c9a534b3a77434d158cbc2ab625630
SHA15cfe1ca771b64477a9e18f4f1fba787601725e43
SHA256aa328015ca17ed089ef73ab166b8d6b40ff8f93303d4b10f243a3034edab9788
SHA512c057a8dc31439ceebde894cb6102d53cfab7162ccb0d24fb1e06bfb58c01885ab316d5534147c1c2235de7dee08cf33380fc0e9b69e809156e06d689a5b506f6
-
Filesize
1KB
MD571c632da8058b83ad0cf1e6d0795907f
SHA16c51114aef9087ea2b3c8327ceea4a99cf571d87
SHA25613a7a1b4f3c6fca1b314e6ca3b28646cd8b70d6c9d3f57ca8700b7b084ddd5c0
SHA512bf5054c32bf0979a53f7335d904b4164bc8fb67252f461ed7f8019f930792f7e277573b16b47a526ea8ecce6911e9b1728c282f2d3c20b987b017dfc51589193
-
Filesize
873B
MD51cf97ecf661c658128dc68d291861fb8
SHA13a84d6835038476123d824f6dc0058a5acd27bc8
SHA256346214a55c5d73ecca93e0dbcce748d7b715a1e37aeba2eeae8cb264d1a53557
SHA512457576a23e26d43d6370ec3783d0791635d2d84d89b357f8aff1bd57ed2aba98cbc5ac9662b477290cde5ed1f35ccb46560db47e9cbd7b18e89bce569515464a
-
Filesize
6KB
MD538faed885b0004809d332b59b16e8afe
SHA1d2566c4fba4d33ad7fcf61cbf45fb686004ae98b
SHA25642b0965ffeb53ad4b01c8ead83cbba3a37c71498407af1547abfc97a67a39392
SHA512ea2c6a2fc78f3077239bef9747e5fb252af392020bb03d9e64f5e4e4235a65cb1979055d5cde3381326ad61999047025b69427226d457476d408359df39f505a
-
Filesize
128KB
MD527b4caaebfc72b39da4d4206a6308e18
SHA168427746fe1a6d1a5546039a8dbdd81e1acba140
SHA2569068b7d57d4bd7d4c21cc360ed06d43e72dc9727f0a8cc0d869348c96cc8886a
SHA51230b7891906ab7b8e10fd1202c34f097cd8adba7d81cdf19cf66df20588d971d52d1303cab17b56c20581d2283fc48521b3568e43772654ca52bb7c120bcbfe0b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd