Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 10:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.smartsheet.com/NDY0LU9OTS0xNDkAAAGSGPpcyTH2JK6YzwQQctUiLwvx1SWNIUoebv7rTYoCeoJhqkhQxIAvA2xqY2Zh6JTryPLUACQ=
Resource
win10v2004-20240226-en
General
-
Target
https://go.smartsheet.com/NDY0LU9OTS0xNDkAAAGSGPpcyTH2JK6YzwQQctUiLwvx1SWNIUoebv7rTYoCeoJhqkhQxIAvA2xqY2Zh6JTryPLUACQ=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559229544597364" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 2436 chrome.exe 2436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3276 1104 chrome.exe 88 PID 1104 wrote to memory of 3276 1104 chrome.exe 88 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 4284 1104 chrome.exe 90 PID 1104 wrote to memory of 3248 1104 chrome.exe 91 PID 1104 wrote to memory of 3248 1104 chrome.exe 91 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92 PID 1104 wrote to memory of 2544 1104 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.smartsheet.com/NDY0LU9OTS0xNDkAAAGSGPpcyTH2JK6YzwQQctUiLwvx1SWNIUoebv7rTYoCeoJhqkhQxIAvA2xqY2Zh6JTryPLUACQ=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf6ce9758,0x7ffdf6ce9768,0x7ffdf6ce97782⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:22⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4808 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4688 --field-trial-handle=1708,i,4506869737030599960,979249227516464892,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3320
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:620
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD5daf8b27ed6b00b99c4432dbef6cf621c
SHA112e2ebb15e5368850cc0f4ccec4d67fcbf625345
SHA2564f1487a7d630dc30fd64b7fcffff801e904290bf92851b5b9dab6fb9af9083a6
SHA5122a649f7630016bb73bd69f7273da6bd530866507e245f529872f2e3fbfbb4ab54a362b741c86b8ca0ee28646d1b476eceab923acbf3a62e0dac85a72b14cad43
-
Filesize
1KB
MD5ca61843f7e1dccb2f8aa318ea6d199fb
SHA16b24df921bedce582a025856fd48474b07ceacc3
SHA256c1508db4d8e2cfc261baecbadded922981ee2392bb08224a59f26c89c88f0163
SHA51241c7d256b3a7db266a846d9d83df0b74b86ca4fdbb366efbda242e53a6f506c82633efbd5fc6011d60a67d1adc88cc2a2ee5fe0ffd524776970183c48608fd44
-
Filesize
4KB
MD53cc00e2bf2643597c11926c2ea5eca3a
SHA1045d0e8eb0279b1845137cf796cb0f89575a7388
SHA25662c001c7e8b42402d6e49d8efa959ed0a4c6e62b98867ceb2e53e299b25a9c97
SHA512029a36f10f91a93777e67995e4ee62e1aeeedfc277a0b9e582ad883b1520d292ad3c8342d884f200754a3865d248ff1d828515bbc36e32b6199edfa245159faa
-
Filesize
2KB
MD577dc127e8299e98b6fa28c8a882d395e
SHA1994756225be37a17d6e04770cf9c0d38d3041799
SHA256e4166f57c5ebd05d51b22697c81989b9d00a91306685d0d0deb56d7766f9cf9d
SHA5125f40a23f9d4c9e5b3fb55144ba2aac637bf5791183d5badf89c8a520e177ed07df12ce25c39bccd074076d332a7e144bbae9ee64351479e63bca9d382c5857eb
-
Filesize
6KB
MD5f666df4e901768377f7970cc5d940048
SHA14b67ab7719061114ae26f5db87210e98aa4082e7
SHA2569cd76095fd8ce2571a323ec3fad6e1b58fc61fac1de019642d0ca1590c628627
SHA512da74a863b907bd510e7cdd4edd0ab6c1184a7f448352fd675616ab825b8a67fe34d06eb9f8e689a93c5b6de4a4c9a1f71b33789d28111ec0ce9a06e6db72183e
-
Filesize
253KB
MD5f0d182ce2156989091b988cd3e0a5353
SHA182104dd9ca1d23a23ada3179e2a497207da2db19
SHA256bc0a29aa7414e56aab94b54ee464bf8d41eaaed99c4b173050fa8c7de5ad82bb
SHA5121dcf96842e91db8cefae9cffc8b05e04315577bcd1cbe4820dbf90a13c3f2ce3cfe01cfcf92f48f3b55bcbcc733ca70c166c3611231664a7d5a3dc868c384c16
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd