Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 10:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn-web-assets.dyspatch.io/org_01dkczrvg1vfk07fv6g3p7qf09%2FPqa6k05TSjuUVfwK3qln_Email%20(Txn)%20footer%20Canva%20type%20logo.png
Resource
win10v2004-20240226-en
General
-
Target
https://cdn-web-assets.dyspatch.io/org_01dkczrvg1vfk07fv6g3p7qf09%2FPqa6k05TSjuUVfwK3qln_Email%20(Txn)%20footer%20Canva%20type%20logo.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571329495086913" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1524 2928 chrome.exe 86 PID 2928 wrote to memory of 1524 2928 chrome.exe 86 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 4508 2928 chrome.exe 91 PID 2928 wrote to memory of 1176 2928 chrome.exe 92 PID 2928 wrote to memory of 1176 2928 chrome.exe 92 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93 PID 2928 wrote to memory of 3176 2928 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn-web-assets.dyspatch.io/org_01dkczrvg1vfk07fv6g3p7qf09%2FPqa6k05TSjuUVfwK3qln_Email%20(Txn)%20footer%20Canva%20type%20logo.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdc1d9758,0x7ffbdc1d9768,0x7ffbdc1d97782⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:22⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1892,i,13711220645724152378,5005825572485791588,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762B
MD560930bebad28b608e38641347aca67c9
SHA15ad33965ebcf612e5269140a91962406d42b03e0
SHA256968c9144dbbc81cd250c3505c016089678aff71318df563ded876f992fd00666
SHA5125bed59790032cbc4182bdb6d64e6e3d50590ab8cb07dfffd07ffc31b4b28fe46243651fd37d0c76a5771675bb7a1edfc37eb38693ccaab285bddf0cb23a4b47f
-
Filesize
6KB
MD53977457d05ccaba244e3f560acd204b0
SHA18e809969a729c656c24b48346960d2311a1c8a2d
SHA256e1fde9522663ad0b2492617f13653df87e21c2a48753e8512c5d18c7504914a9
SHA5122663e0632d1ce99303a07d454b2ed4c53802361f354064bb96ed9ea6f4cf53b79c436170c8ad4a3614ad9b327203a8021e983c421d5d34cde5b7b18114521219
-
Filesize
128KB
MD5f4264c6e54e67a2b788ef62e3ecf3583
SHA1ce611b84f54ad5b9576a5d96719fc992172b8ad7
SHA25673bf20e0f201a8b000f5c37c73e8db77c0ab881ebe910ee5be661d0c0817e268
SHA512e74dead6ba94f3e4866008952721ec7baa166be8eda755b719fc78de247fe47ec5792602082c710b4676b483ec0349ba378cff98da1b98906e0871a01bae0872
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd