Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 00:47
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fgoogle.com%2Famp%2Fs%2Femotionalmasterycoach.com%2Fteams&locale=nleyludzd&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Famer%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=x7znMWe5rWzQo8BjX4IzNFNdD5ua9PgpUWl0mlAKFYVwns2GhDSVjZoTzc6h2hb8nwh0jjZIt5pDy4%252bYFvmiDuEEf5ivOOF7b6t%252fLCbhoyeLbvtrxabDujqB3BH0NNfRi3UbjG1Nf9omprLVTs3Jluro%252bLrv6fA%252faBYol%252fagmA9CaFmGqXRb9peF9XE14GzNxi%252fqgHZHQSEJPTa%252fQOXJaLvwal6ok4wwGDeJV3oFHkGMOb0m97ku9soDx3qz8UMVFmu6W9HitVZ12atCVeKH43IjZezYCFh4A8MxZvj%252brzwC6ZuYVkw6P%252b2gpSPp643t64NQlYsWYNxRNxrPWT0yLDAKFDL1D6hEgI1pfGvK5B20qLSBJuU2ds5Kb8XXBJsDfVTQLzzNqgywKr5GvkhvdzZ63eCFZuhtmVGvBxI9eXWi7qa51RNkmnTJe2vXXezNW%252fNCm4Xcioj6VKIuRVIypSjIt2rXCxh4Mq2pKV0vogLupEqWXQ%252bJ3NBNztjDQdmhDxM0m3JyYpaJgAMOYWj%252fwBpbDCLt3lDnlLBNPT3scUK3g4HdOd5AkQbAZliaeJLYhIJbAeFwhw4jt6xLwLfM1wGw9F9qXarSi99%252bWZ2UGGsK22VgPDh8RZHAJiVkqscXkg5%252fYKFnSjM0ZF8asP20cxMniKWPfl%252b6ztjzeLVNiEbbGas8wmgExtPE4sJoXWKJsR9qsiTq5sAWWpmXLvqQjaNrrqgBEhxvyM%252fHRqA3c88aWDjLnS35jwTeXC15Vrmqn9fMBzywVDsS3ZOMYIxc8xK3Y8b0P82ylgHvQ5MJtJbFsAnN2v3AE8hfqrBaY%252fngX%252bxKJVTAOsbNOtaosQ42TmHsZPTbGN0U%252bM9eOowOePpsYqPQVD8Oia3r%252fmyhnacmhgpfbQuyuTTjHSb1PIO8vlGPsOgUQGVc87njWR7GhyAO97qYtjTOZ57ukBT3D4gDyD6tRKwgDGKZG7jRa4dxTSJ7Mi3XQJ4bp4pfipnTZpfYIu3iWWGK5UnN%252beVfBCmjUmguI8zmEKstahhgY4GV5j49EighXpii89%252f%252bjphdtPatk%252bUswVItnbmNR9%252bGGw%252feEQBluitDDbXq5pdzcqHdg4977z7Jv%252f1tdoWaBkB5pHaQ%252bk96FcTGP1LUotQWpBox8toGjQ1Jky5hNvXvQQdQDnoYcHXeYPU4ZRfUmRtmbAW4iGze5PNfNTUpMyViMATVlf0ocicOBhgOTeyWPT2w4TwHSDrUe9HtnL%252bjj3McWUiOpkQDkf%252fzLo%252bucm7fA6ogqm8DrJaedTwZ6Ie4QqPC%252fwSzKtl%252fqtjsnmw3GXepCjqmSQAPo88qcdLdez%252bQRoh3eOJ6ChLYd9wFpX%252fnDsyjz2hZ5mqAYfIZfln5us1ob33Lmb55jiMBATQE67ZU%252f%252f9MpEjx5K%252f9LUfH1elKQjZ%252b%252bBmGFWKoTdeSH1bvfoifS9M%253d%3B%20expires%3DTue%2C%2019%20Mar%202024%2015%3A58%3A41%20GMT%3B%20path%3D%2F&wau=https%3A%2F%2FNAM10.safelinks.protection.outlook.com%2FGetUrlReputation&si=1710694100650%3B1710694100650%3B19%3A86189122-bce7-4128-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces&sd=%7BconvId%3A%2019%3A86844809-bce7-6010-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces%2C%20messageId%3A%201710694100650%7D&ce=prod&cv=1415%2F34491076997&ssid=3a3cd148-f47e-4c1a-8c54-34445cc0a137&ring=ring3_6&clickparams=eyJBcHBOYW1lIjoiVGVhbXMtRGVza3RvcCIsIkFwcFZlcnNpb24iOiIxNDE1LzI0MDIxNTI4NjExIiwiSGFzRmVkZXJhdGVkVXNlciI6dHJ1ZX0=&bg=%23254658935023&fg=%22ahjexqxrwnzdympdnze&fg2=%23044767427xwbexbxkdhwhsfud
Resource
win10v2004-20231215-en
General
-
Target
https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fgoogle.com%2Famp%2Fs%2Femotionalmasterycoach.com%2Fteams&locale=nleyludzd&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Famer%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=x7znMWe5rWzQo8BjX4IzNFNdD5ua9PgpUWl0mlAKFYVwns2GhDSVjZoTzc6h2hb8nwh0jjZIt5pDy4%252bYFvmiDuEEf5ivOOF7b6t%252fLCbhoyeLbvtrxabDujqB3BH0NNfRi3UbjG1Nf9omprLVTs3Jluro%252bLrv6fA%252faBYol%252fagmA9CaFmGqXRb9peF9XE14GzNxi%252fqgHZHQSEJPTa%252fQOXJaLvwal6ok4wwGDeJV3oFHkGMOb0m97ku9soDx3qz8UMVFmu6W9HitVZ12atCVeKH43IjZezYCFh4A8MxZvj%252brzwC6ZuYVkw6P%252b2gpSPp643t64NQlYsWYNxRNxrPWT0yLDAKFDL1D6hEgI1pfGvK5B20qLSBJuU2ds5Kb8XXBJsDfVTQLzzNqgywKr5GvkhvdzZ63eCFZuhtmVGvBxI9eXWi7qa51RNkmnTJe2vXXezNW%252fNCm4Xcioj6VKIuRVIypSjIt2rXCxh4Mq2pKV0vogLupEqWXQ%252bJ3NBNztjDQdmhDxM0m3JyYpaJgAMOYWj%252fwBpbDCLt3lDnlLBNPT3scUK3g4HdOd5AkQbAZliaeJLYhIJbAeFwhw4jt6xLwLfM1wGw9F9qXarSi99%252bWZ2UGGsK22VgPDh8RZHAJiVkqscXkg5%252fYKFnSjM0ZF8asP20cxMniKWPfl%252b6ztjzeLVNiEbbGas8wmgExtPE4sJoXWKJsR9qsiTq5sAWWpmXLvqQjaNrrqgBEhxvyM%252fHRqA3c88aWDjLnS35jwTeXC15Vrmqn9fMBzywVDsS3ZOMYIxc8xK3Y8b0P82ylgHvQ5MJtJbFsAnN2v3AE8hfqrBaY%252fngX%252bxKJVTAOsbNOtaosQ42TmHsZPTbGN0U%252bM9eOowOePpsYqPQVD8Oia3r%252fmyhnacmhgpfbQuyuTTjHSb1PIO8vlGPsOgUQGVc87njWR7GhyAO97qYtjTOZ57ukBT3D4gDyD6tRKwgDGKZG7jRa4dxTSJ7Mi3XQJ4bp4pfipnTZpfYIu3iWWGK5UnN%252beVfBCmjUmguI8zmEKstahhgY4GV5j49EighXpii89%252f%252bjphdtPatk%252bUswVItnbmNR9%252bGGw%252feEQBluitDDbXq5pdzcqHdg4977z7Jv%252f1tdoWaBkB5pHaQ%252bk96FcTGP1LUotQWpBox8toGjQ1Jky5hNvXvQQdQDnoYcHXeYPU4ZRfUmRtmbAW4iGze5PNfNTUpMyViMATVlf0ocicOBhgOTeyWPT2w4TwHSDrUe9HtnL%252bjj3McWUiOpkQDkf%252fzLo%252bucm7fA6ogqm8DrJaedTwZ6Ie4QqPC%252fwSzKtl%252fqtjsnmw3GXepCjqmSQAPo88qcdLdez%252bQRoh3eOJ6ChLYd9wFpX%252fnDsyjz2hZ5mqAYfIZfln5us1ob33Lmb55jiMBATQE67ZU%252f%252f9MpEjx5K%252f9LUfH1elKQjZ%252b%252bBmGFWKoTdeSH1bvfoifS9M%253d%3B%20expires%3DTue%2C%2019%20Mar%202024%2015%3A58%3A41%20GMT%3B%20path%3D%2F&wau=https%3A%2F%2FNAM10.safelinks.protection.outlook.com%2FGetUrlReputation&si=1710694100650%3B1710694100650%3B19%3A86189122-bce7-4128-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces&sd=%7BconvId%3A%2019%3A86844809-bce7-6010-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces%2C%20messageId%3A%201710694100650%7D&ce=prod&cv=1415%2F34491076997&ssid=3a3cd148-f47e-4c1a-8c54-34445cc0a137&ring=ring3_6&clickparams=eyJBcHBOYW1lIjoiVGVhbXMtRGVza3RvcCIsIkFwcFZlcnNpb24iOiIxNDE1LzI0MDIxNTI4NjExIiwiSGFzRmVkZXJhdGVkVXNlciI6dHJ1ZX0=&bg=%23254658935023&fg=%22ahjexqxrwnzdympdnze&fg2=%23044767427xwbexbxkdhwhsfud
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553692571463872" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4520 5024 chrome.exe 84 PID 5024 wrote to memory of 4520 5024 chrome.exe 84 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 4636 5024 chrome.exe 86 PID 5024 wrote to memory of 2024 5024 chrome.exe 87 PID 5024 wrote to memory of 2024 5024 chrome.exe 87 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88 PID 5024 wrote to memory of 5000 5024 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fgoogle.com%2Famp%2Fs%2Femotionalmasterycoach.com%2Fteams&locale=nleyludzd&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Famer%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=x7znMWe5rWzQo8BjX4IzNFNdD5ua9PgpUWl0mlAKFYVwns2GhDSVjZoTzc6h2hb8nwh0jjZIt5pDy4%252bYFvmiDuEEf5ivOOF7b6t%252fLCbhoyeLbvtrxabDujqB3BH0NNfRi3UbjG1Nf9omprLVTs3Jluro%252bLrv6fA%252faBYol%252fagmA9CaFmGqXRb9peF9XE14GzNxi%252fqgHZHQSEJPTa%252fQOXJaLvwal6ok4wwGDeJV3oFHkGMOb0m97ku9soDx3qz8UMVFmu6W9HitVZ12atCVeKH43IjZezYCFh4A8MxZvj%252brzwC6ZuYVkw6P%252b2gpSPp643t64NQlYsWYNxRNxrPWT0yLDAKFDL1D6hEgI1pfGvK5B20qLSBJuU2ds5Kb8XXBJsDfVTQLzzNqgywKr5GvkhvdzZ63eCFZuhtmVGvBxI9eXWi7qa51RNkmnTJe2vXXezNW%252fNCm4Xcioj6VKIuRVIypSjIt2rXCxh4Mq2pKV0vogLupEqWXQ%252bJ3NBNztjDQdmhDxM0m3JyYpaJgAMOYWj%252fwBpbDCLt3lDnlLBNPT3scUK3g4HdOd5AkQbAZliaeJLYhIJbAeFwhw4jt6xLwLfM1wGw9F9qXarSi99%252bWZ2UGGsK22VgPDh8RZHAJiVkqscXkg5%252fYKFnSjM0ZF8asP20cxMniKWPfl%252b6ztjzeLVNiEbbGas8wmgExtPE4sJoXWKJsR9qsiTq5sAWWpmXLvqQjaNrrqgBEhxvyM%252fHRqA3c88aWDjLnS35jwTeXC15Vrmqn9fMBzywVDsS3ZOMYIxc8xK3Y8b0P82ylgHvQ5MJtJbFsAnN2v3AE8hfqrBaY%252fngX%252bxKJVTAOsbNOtaosQ42TmHsZPTbGN0U%252bM9eOowOePpsYqPQVD8Oia3r%252fmyhnacmhgpfbQuyuTTjHSb1PIO8vlGPsOgUQGVc87njWR7GhyAO97qYtjTOZ57ukBT3D4gDyD6tRKwgDGKZG7jRa4dxTSJ7Mi3XQJ4bp4pfipnTZpfYIu3iWWGK5UnN%252beVfBCmjUmguI8zmEKstahhgY4GV5j49EighXpii89%252f%252bjphdtPatk%252bUswVItnbmNR9%252bGGw%252feEQBluitDDbXq5pdzcqHdg4977z7Jv%252f1tdoWaBkB5pHaQ%252bk96FcTGP1LUotQWpBox8toGjQ1Jky5hNvXvQQdQDnoYcHXeYPU4ZRfUmRtmbAW4iGze5PNfNTUpMyViMATVlf0ocicOBhgOTeyWPT2w4TwHSDrUe9HtnL%252bjj3McWUiOpkQDkf%252fzLo%252bucm7fA6ogqm8DrJaedTwZ6Ie4QqPC%252fwSzKtl%252fqtjsnmw3GXepCjqmSQAPo88qcdLdez%252bQRoh3eOJ6ChLYd9wFpX%252fnDsyjz2hZ5mqAYfIZfln5us1ob33Lmb55jiMBATQE67ZU%252f%252f9MpEjx5K%252f9LUfH1elKQjZ%252b%252bBmGFWKoTdeSH1bvfoifS9M%253d%3B%20expires%3DTue%2C%2019%20Mar%202024%2015%3A58%3A41%20GMT%3B%20path%3D%2F&wau=https%3A%2F%2FNAM10.safelinks.protection.outlook.com%2FGetUrlReputation&si=1710694100650%3B1710694100650%3B19%3A86189122-bce7-4128-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces&sd=%7BconvId%3A%2019%3A86844809-bce7-6010-9d89-521b728b68f9_de39d79b-7296-48fd-a8f6-f072b57fdbfa%40unq.gbl.spaces%2C%20messageId%3A%201710694100650%7D&ce=prod&cv=1415%2F34491076997&ssid=3a3cd148-f47e-4c1a-8c54-34445cc0a137&ring=ring3_6&clickparams=eyJBcHBOYW1lIjoiVGVhbXMtRGVza3RvcCIsIkFwcFZlcnNpb24iOiIxNDE1LzI0MDIxNTI4NjExIiwiSGFzRmVkZXJhdGVkVXNlciI6dHJ1ZX0=&bg=%23254658935023&fg=%22ahjexqxrwnzdympdnze&fg2=%23044767427xwbexbxkdhwhsfud1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe96389758,0x7ffe96389768,0x7ffe963897782⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:22⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:82⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2312 --field-trial-handle=1900,i,8019138132180985344,134521375320488212,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD585c2ba1389eda185001218a2ec3a62e2
SHA11d4dfec6956ff29b561d630ad74d18735d2f306c
SHA256468cc2cf0b9063758fce9aae7ed79063219f08139f65076499cc204dfbd3f901
SHA512a42d7e780a59cddcc7ac27951c331ff9869d6849ba6b720b87862d89ee385cb62afe291370be4bd3a926ee2db22835475c79cfc6614b3dae319e4edb94565bea
-
Filesize
1KB
MD5ddf733c9f476aa415e0f545bfe0b5d52
SHA132b48d1c356cac562294e386c475891294f7e1f1
SHA256d5b97b04194cc35c91c8dbab3eadc64bce838ed2278b6d2bbbc6233edde13f43
SHA5129cb8a6a8c0bc000a65844b9f72a017724afbd943c59a1697d10ce09b5a46ce86da5ba71d7f0a759c6fd6547961a0f0dee1fb911a63fd7326c4e6ec1ada2631e1
-
Filesize
536B
MD586deeccf6809203fbcd0ad9b9de3e981
SHA1ba6d383cc797c20235cd556f3b463c8d16378d03
SHA256fe69edaea3237b359268b11ce3d93b248a30acd5479c0264e7aaa3f2e9dcd778
SHA512915534dc9f6adbb15cfb167f473c8e928b4047d89a1e6827b258d8450967f0f939a313e3cdfb5bd3d799054cbd2f04739d548b2bc705647bbedc160ff5549b9c
-
Filesize
6KB
MD5735a76c3446d0c52fe18280590254020
SHA17525b86ed4100a90ab70750084c9c07e1cb39868
SHA256738501fc8b699ed9140d1c236c10209b0842267ac3e06155138c1b410edbda7d
SHA5127499624125fc1808b74d6d28a6a0f7de603e6475064e76652795fd2c5df96d7adcf35533d68bf0f2d893bdb75d7098ec9a62428c3c70c3d2709bc61f522d91be
-
Filesize
114KB
MD5335113770ef971b49b44787c6173d9b9
SHA1aaf579dfd9e08d8e652cce403d5579c125ca77d9
SHA2564c49f428d2598ac4e18d2a3bba46dac207af93b3b809f2eaef9cd6d1a5f76789
SHA51269f35b7c7cc4515e46699e8cd41a6a7423ab98aa6087ad95fd1b7eee297d701a1c2fb1b751792ac0db92296e06c92bd66ee0f1b6c322161fd7e775af1c4f0043
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd