Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-04-2024 23:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/forms/d/e/1FAIpQLScExE5rDnY3Ho4Kr-UjHF9Mg7h4uhI7c6JeMiLpvWOY-X0Wgg/viewform?usp\=send_form
Resource
win10-20240404-en
General
-
Target
https://docs.google.com/forms/d/e/1FAIpQLScExE5rDnY3Ho4Kr-UjHF9Mg7h4uhI7c6JeMiLpvWOY-X0Wgg/viewform?usp\=send_form
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133570915145161630" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 4700 4132 chrome.exe 74 PID 4132 wrote to memory of 4700 4132 chrome.exe 74 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 3596 4132 chrome.exe 76 PID 4132 wrote to memory of 4100 4132 chrome.exe 77 PID 4132 wrote to memory of 4100 4132 chrome.exe 77 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78 PID 4132 wrote to memory of 3320 4132 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/forms/d/e/1FAIpQLScExE5rDnY3Ho4Kr-UjHF9Mg7h4uhI7c6JeMiLpvWOY-X0Wgg/viewform?usp\=send_form1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbe1019758,0x7ffbe1019768,0x7ffbe10197782⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1848,i,17583870122740621515,16146973530746937308,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5238438a684953112f037f41d30ceda84
SHA194189e016d74c2b71cbafca2c599c77d86a47b13
SHA256159b1f9398009df27144c54daad0f9bcdbd25f40294fed6a127680450fc56932
SHA512c9f97f16afa7a5ec10c5ea03845dfddad6c4c6a0ad43a78feee0480d7e51c57d4dbefdc13626177c23ea110ce548070707facc5c9c6c914172ad9df0ac838f23
-
Filesize
2KB
MD51f794af3dc092150eae02ce0df193bf8
SHA1d199efd2b91b44e311c3643136d80617f79b4d47
SHA2569fef9c50021cfd17318c63f389cb633bfe200cbc297e8b38291e95f725094329
SHA512e1a988fa75c7592a77c12204eba7ce721fbeabdc82301cece543d57da8c8a850c97da6744437aefca1468596023f59174dbc874bffadd35dc3e06b3f7c367cb3
-
Filesize
2KB
MD55b5e44ff7a201e5aed480a22084912fb
SHA10edfc0cce7d5d32b9fc784998810f763d76004f8
SHA256343f6283eaf740981aaa83d25c381a529ec50940f15a2de3d83287bdc076aa7d
SHA512202a0bf1c2c3043cdc50b3b61a8d0fa862c009693e33c38aac708f52d00fac194666c73921be9a2561ed9b3cc4e83137bc9fc80b2eb33be4830b1a7aafae89f5
-
Filesize
2KB
MD543235cb5a952e62c6276133c4a3a5f95
SHA15cd1dfe9b21c2f8eefd3ddf6b76aa9f907faaee5
SHA256bbbc802fdf7177e9a8cbc97ed981bb2bbef6959f0a741316d81abe9a374b0696
SHA512937ae497ed234d601a54fe514e362151d01bc92cee45a8794bce79761c27870f6af2e3e5b31a15d99a10ae09f87cc99ff46cb6cdade481aa9cc6c41cc3546c03
-
Filesize
2KB
MD54c7bcd32e5f0c92bccbd283b54d219d5
SHA13d245f4bcea7a94922f8b1a15017c78800391026
SHA2564a78de81d8babefff66dcc8f61b9f16c0cea2dc0b5bd81b104f14d7fc8a770e7
SHA512a55a49ff8e99f26e89cf22b0ac11c283276bdc3ff5e3720a2049b2d0cf11047de3737f13d07d0757b3945974ce3b7968dee840cf22f1be602dde2b68cac4366b
-
Filesize
539B
MD5bc3abb3771580b828adcba7d0c66c6ae
SHA1bb2ef4e864d1406b065b713521a3794835976a71
SHA256fdd10894f71e922e9ba72d4f4de33200c522b1c45ae4586c938d38812189839e
SHA512e995bc3fb4cef9b1ed4ca59b610a7199df7864ee00943287301937272aa5a86b4cf57c91e7e67df938e295fc1cb78ae5ab65228be5ee7059afc94da63acff8fa
-
Filesize
5KB
MD5fda20ca12ec067b48616b9dce891f79a
SHA16ce6c104411d4bf8290869e979f609a85dba99ba
SHA25666ace5fefc68db0ba237a617c5bfc4e8d1d9e6a674b4639ab558eaf0cdbb866b
SHA512384267c4bae693d755dc585741374fe38121a0e4656ad3338dbd961e776d33da4b006dcbcade8286737e915ecc784a6014b86e73e69a80cbd8a79852957f3a16
-
Filesize
5KB
MD50bd96cca7bb7dfc1823ad3ebc261feb1
SHA15a202f8268af8cf1c35d616cddac8586f7a79608
SHA2565a4b310358f9c20246b11cb157f46c0a8c8e3a956ebb3312fc57b0f80190fe87
SHA5123044d10cb3af081f6b055b2fb31432f51e3102875e76d22d55e7ec7a202d60a5ba2f0e22d4bdeea329a6d885a0c2136469fda77d3601ab0e3418fec68e25264e
-
Filesize
6KB
MD5881d07afe8ea32f13db3a8cd7a9543ea
SHA139501066ff59c32fb5c94c31058a984623d53bf7
SHA2562322f284baaf65783de3693400c87c3f009c71b53c73851b7137b40450329afa
SHA5121720de03d9d462738c1b55776d512945cfcf8fa4d57e41016b654a92827b8b07bbd8313ad0135f628ba366892e126b14797e5f4b70346b69a69b415646b12d9b
-
Filesize
136KB
MD5c1923e29f5c1e6b2dce41aa985db6afe
SHA1a4dbcc667912c70977fe22c467ebbb9f4b0a7b99
SHA25666c5059dedcad1a002be9520527f04bc9a8f6524c10f9115040617ab9da9f138
SHA512d2dbb0b619eacd4c14794bb913863e637d76bf417b19c4335dbb9f69ae27c3425b7545d09a1f32707b563eb43e0d5fecc3817853070c75c9b748fcc08dd082b4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd