Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://info.zoominfo.io/acton/ct/43780/s-05fe-2404/Bct/q-05cd/l-05cc:78508e/ct1_0/1/lu?sid=TV2%3AKJRTkLd08
Resource
win10v2004-20240226-en
General
-
Target
https://info.zoominfo.io/acton/ct/43780/s-05fe-2404/Bct/q-05cd/l-05cc:78508e/ct1_0/1/lu?sid=TV2%3AKJRTkLd08
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568129715607858" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1644 1396 chrome.exe 93 PID 1396 wrote to memory of 1644 1396 chrome.exe 93 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 3132 1396 chrome.exe 97 PID 1396 wrote to memory of 1764 1396 chrome.exe 98 PID 1396 wrote to memory of 1764 1396 chrome.exe 98 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99 PID 1396 wrote to memory of 1960 1396 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://info.zoominfo.io/acton/ct/43780/s-05fe-2404/Bct/q-05cd/l-05cc:78508e/ct1_0/1/lu?sid=TV2%3AKJRTkLd081⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff836ce9758,0x7ff836ce9768,0x7ff836ce97782⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:22⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4020 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3704 --field-trial-handle=1880,i,3060594623618469598,7582992165583664056,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=3136,i,3192284747741020952,1225278682167953346,262144 --variations-seed-version /prefetch:81⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5d8a81f7a0812cfa7692e5a1a6691d322
SHA1139395507d4fe1cb1c2960f83d8214128100bb76
SHA256799bae06ed60390b740b1dbcbe58ff95f4c38cd01e0df382dc0fcb99b3c95eed
SHA512ebc9d6e2836e45ec39016985ef2c2fd04d9bb429cc3110c5d9c53c3733555e4e242cc4ea517c1902ed471e4357baa4576af93b4f4a02cfa722c89706cbb925a8
-
Filesize
964B
MD58182bbdaafdea54c08b2d31f1a6b074b
SHA1310c87f78a39ecc255a5f9e1469d732e4a2d9de6
SHA256c5c61d881b66ae943f29aa81abee2b6c33948cb8ca304574d428d0b54b259da1
SHA512f60b8edee6d34f00e455ff05bf855737d38aa40d69026a7fecbcc9b22ce5019d8906dc263a4299b564c5e0517d1c57da580a5d073224eace7922fc7c489791c8
-
Filesize
704B
MD5c500f1a3fdc170c93a521785474112a0
SHA1259ea45ef13c4fc118582477798a39cc9007fae7
SHA256abe1f4225026f771ddebce3a68a92812615f7026018a2c22d0192452bccc0062
SHA512d47064f4ae986ff26e840d0aaad098efb5faefdf0e6a6d8fc51f77b3675ab3ebbe9c01424ce88aaf63a51f04c8a60e64ae3200bdce125b18040c87a86a9836e9
-
Filesize
6KB
MD5099f2d9618b86ea1c0e927f21f89ac7d
SHA175c0b1fe75e240d6851a2be86f0f323c3332929d
SHA256ba4c823d23a6eb3e9f8a99e120a1ba235e8d263763fbe11ff007db35de04ce97
SHA512420ef80848a93d2c1e0f7c0ff5fa3c10efad22783ec7141addab4f9362671a1732adb01b89e34da8c79b60431a427c1fbe04d3dd6b7fd0c14baaa37615a90c35
-
Filesize
6KB
MD52d16d8b53df0f65381847d60d3d36862
SHA152aec7ccaac1bee4b8bc905b12e536e2c6d618c5
SHA256e16a65f5e2d0d03643cb9c2fbe8c1e7f7bad337c5e6879b4c78ab37b0c90b48a
SHA51241cb90efd3087a8eb1de4bffe9217615017912d93b68f06ca29405e14ebfc5294502bb452f2213ff8389fe4d24cddd48c147214d2461478febe05a3fb8af62b2
-
Filesize
128KB
MD5d521a18351cdb7c2811b576ffccc91ef
SHA116ff22b53fd7094a0dee7fc5b7a179f38aa0304c
SHA256f6d8ebd68f8d92270c7c729e23602ee815c1d2dce991cb030ec3b358acdec0e5
SHA51252b1277280c71f0cc45dbb0fbfe7aaa3fe52a753c8360894503d003b583203c8a859b647c0814d422fbc771fbb0d90c3969006a8c6d426a8a49c008a7e639fed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd