Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 08:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stage.ar.drivehub.abb.com/healthcheck?Test= Set-Cookie:crlfinjection=crlfinjection
Resource
win10v2004-20240226-en
General
-
Target
https://stage.ar.drivehub.abb.com/healthcheck?Test= Set-Cookie:crlfinjection=crlfinjection
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567810660993297" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1608 1912 chrome.exe 86 PID 1912 wrote to memory of 1608 1912 chrome.exe 86 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 3548 1912 chrome.exe 88 PID 1912 wrote to memory of 4988 1912 chrome.exe 89 PID 1912 wrote to memory of 4988 1912 chrome.exe 89 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90 PID 1912 wrote to memory of 3684 1912 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://stage.ar.drivehub.abb.com/healthcheck?Test= Set-Cookie:crlfinjection=crlfinjection1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffacf9758,0x7ffffacf9768,0x7ffffacf97782⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:22⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2760 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2768 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4664 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4996 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:12⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 --field-trial-handle=1888,i,2029252828918834843,5740972616986881900,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761B
MD5c7630a259016462b99acc4b902dcb48d
SHA101418eda3e46b4ac1ec25084c728e3c9b02a2497
SHA2562d1b4ca26fdbf59d7ea4bf26e7bb61e53c1bbac52ea00c2bc44d88bb7c8b1a41
SHA5123394a07e6746ae0f87879598a8b639d55cae2db6685e17aab7c6534e558c98c04d2940068faad94f0bb13fc993199d4e6534010f86aaf9b2b5ed3535b6b2790b
-
Filesize
536B
MD5f95cf416284f92d2978a317124231a07
SHA1439315a12602dc432388fbece0494d2d07bbc3c8
SHA2560b4642944ced0bdc679e602a2e3d7c468130cd8b05f44d6fe30ac8566920618e
SHA512cc59be05f9ae3ebd70901ef80ccd928b98b2d7fd205cc72d56805cd29a60dedb25a4fb6ca6710fb1495e1a33b44078a651add57197735555928d34b49377ce68
-
Filesize
536B
MD5bc16798da0cfb7d9ac3f30659312629b
SHA12276e2acedcfc7742af45e1d684b085d1978ebaa
SHA25626a5c8cd6da8133bbd80681a0e537a4061b562a1ee5d4a403bd231c834e070c8
SHA512119f6700e5f5a59467ec9d4c89d09b7e2a98ea34a637d94b70fcdc7b91353a25e73241e1230ab7b28cdfc8d8168e14190de92845d2be592b7412eb65eae2a888
-
Filesize
6KB
MD5f0a93ffa5842870d8ebaf6d5f17fe229
SHA1478407d73d4b0eec4fd88e4c8ca9638d592e5735
SHA2569432113c30b14218fec1cd320d86fb2a74b79555495d5159127a7b1b48a9c263
SHA51242446413730f539cdbfdf8290ab7ad6983fd066f2b267da96a4b9742459ef0c0bfec5924e70048ccd629b6c229c43414c82fe525dd0faa6667bf556d9746e282
-
Filesize
6KB
MD5001f0cb5cdb54cde4e0d8053e12910c6
SHA19cc5c76757929cef11cbb0351ae31003f0871244
SHA256ff0313fac2b3f5b57907f6d24d45269c66e0cacacfccc42ad4354ebc66fae993
SHA512e3203df4acf30e74a4f8fd4d30ee7c8aa05d34f9360f48cd23adefc9685af794af9586f85310f5a77ed84938fb886828780564ec0804571417f8e3341cf6ebfe
-
Filesize
128KB
MD5a713ebc4b391e70bee09703f8643f31d
SHA19bfb9ea2b37fd342864eec63b2323e0f017b17a7
SHA256c57a8cf789fd7201815412892e7905911be4c06a67c7b9a735081995b4ad9030
SHA5128c25547de6c93c43d6eaa3681cfdc353410aa59501dd74738cf91caf2746d0e8d1aab1eac263f4186685c79042e59a75599004f5f7ec62a762807dd683d4c3eb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd