Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://view.notifications.brightspeed.com/?qs=f892222a57c4e0d2f59f50ee967245d5e4d8f2916a93af4c0d4d7570ce88bcd99de0b84040a2c389168839bbd1c2db2cca82a1fb299638fc7cee74064ad6f3bdd07a9b4298ef13a3484263bb07867c94
Resource
win10v2004-20240319-en
General
-
Target
https://view.notifications.brightspeed.com/?qs=f892222a57c4e0d2f59f50ee967245d5e4d8f2916a93af4c0d4d7570ce88bcd99de0b84040a2c389168839bbd1c2db2cca82a1fb299638fc7cee74064ad6f3bdd07a9b4298ef13a3484263bb07867c94
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559419980878452" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3340 4612 chrome.exe 93 PID 4612 wrote to memory of 3340 4612 chrome.exe 93 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 2544 4612 chrome.exe 97 PID 4612 wrote to memory of 1592 4612 chrome.exe 98 PID 4612 wrote to memory of 1592 4612 chrome.exe 98 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99 PID 4612 wrote to memory of 3080 4612 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://view.notifications.brightspeed.com/?qs=f892222a57c4e0d2f59f50ee967245d5e4d8f2916a93af4c0d4d7570ce88bcd99de0b84040a2c389168839bbd1c2db2cca82a1fb299638fc7cee74064ad6f3bdd07a9b4298ef13a3484263bb07867c941⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdb949758,0x7fffdb949768,0x7fffdb9497782⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=400 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:22⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:5164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:5600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:82⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 --field-trial-handle=1876,i,12529404522417386592,14193846582363634449,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:81⤵PID:5940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d5dd3bd5824164778f47014f7f620dc
SHA1f4044309baf95641c25e2d130e9220fac27cc963
SHA256989415d91f806c5f25c9d66b0fb6d0c3c91db0032fa26afb249cd86460686873
SHA512858a922efff6d4e954ac754373ac5e44f72165c37da414f77f0800c4925572aecdb8763adde7387fe9c7438861b5807b1a67be4876fbd17fe14b67e1a2e800ee
-
Filesize
1KB
MD52f731320796771fa0ceffd543c6de71d
SHA1296d521b131298411d0e511c79e621bad57c6908
SHA256eb879e131917467035e6216f6c582a4ccaa9828d23b932c1e8b5f13d799e8806
SHA512ac28084e66eb01b0acf45f48a883a8bb5168d768225e1995c5f2053bef605af318bf49d7df415e88fd71980f0a3dcc29d1eb4f086143826bddac94755c1a63f9
-
Filesize
6KB
MD50ca710b1e41bdc3da41b7eaf2a9b6170
SHA143ffdb9cd9fac161611cf441e20f3e304f4ec36d
SHA2560416c594b1a6a88d106a5e1acc9cc3cccb70c34b7da96825bbcf559ed5252b0b
SHA512747659c298756fb80a62c3edc7a3741169f58196d93d0a6bd0dae575be813a6461ff65bee813af9d0ab6d796d4b2c859fdacf8f6045a0322ebf20a04a1a97417
-
Filesize
6KB
MD57b7ee48357a5c1b8bbdf8ae13de1c577
SHA1d69c2b22d90b65607e3acfe88bdeca5371316409
SHA2560e6c17f758f7256b04670710b5985ae81ac5ca7e1bffd90e0490e8cac107a742
SHA512eec4c8b82749347a38e15af521b32f217f5cc33fcc9824c7f0cd1b3bca3092e4902d002207084235e4e31f0d4dbe4723d6a5b1f381be78a62536aa47d1fe2c98
-
Filesize
136KB
MD51901fe8286850975e9b1d5083ad2e1a1
SHA18afcd05ea9e4942d26dda300b0c0d8d973949d2e
SHA2560a6bafbe08fec2140a13eaf40e7b9eb2f42e5716ba3bb21edd18eb4659da33a5
SHA512185fb67334abe97c9dd03123595bb2ffd97bedf1a501883f71c0be0806222598ed2ce80791aad885b01b8b4ac718a221b099c7d69920a337989cbd81db782a8c
-
Filesize
136KB
MD5ac9eda8eaed9ffa3cfe971bde87d0df4
SHA1dde08ad37d1c56247d6924a217f3c987a2b9742a
SHA256fb701c629982222af1ee37332cf4ead11fd91579bc9144770397de4f13cb8842
SHA512c371e123710e5e754eb5e7cff2bd0b2376a89245437609a2942051412206c43974bc268e90e94c0bceb1c87fff44039a577e695732a9b95c516ea51b39495fa4
-
Filesize
137KB
MD5e514970bcab1098f73fd6e296ad6f648
SHA1e16359b1727953da742d12b404b60bd745e668f6
SHA256c49182224c3d7c04d0d2948fc5e3a9adee7aa3f9dad5b5714121415ad4cbf736
SHA512895cf0662fa878bb01775807be9abb1aa5ded9f8e4fa3bba317ba84352cd128f804f968761e58af93f3ac4deb615148bee998961a94fe18b987711cc443e11e2
-
Filesize
184KB
MD5e03b9f6cd87a5c70f8d7fabc4cc28ef3
SHA164aead9556f3b44b5d3bbcf92364180814066a4a
SHA2561ea7e1308aaf6a572e8117ea7257b560cfbde2f5dca3f7df8345752bf49615c6
SHA512657b7d9f54005c7ee429f8cbf45e2b120727225788562bdd3b66c7cc9950ab32bbf4dcd047730d35ec2b78928db304c6db45b634c478b6dfb7b2a7f84c4bbdb9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd