Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:14
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 11 https://akaolab.b2clogin.com/static/tenant/default/selfAsserted.cshtml -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572212961136540" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4168 chrome.exe 4168 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4168 wrote to memory of 4720 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4720 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4888 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 876 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 876 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe PID 4168 wrote to memory of 4860 4168 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://10000105.sagefrp1000-dematerialisation.sage.fr/sfd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae3739758,0x7ffae3739768,0x7ffae37397782⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:22⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:82⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 --field-trial-handle=1880,i,2037726043387484046,6444457616751598182,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1428 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794B
MD59472d04b4b33e0ea44b0184bdb0eebfa
SHA1d59737279a65132bab2f780e8986910df69759df
SHA256de588ad014d9a49215c3698a9470cc8b8ea509df753edbc67511e052976d5ebb
SHA512fb679b1b34e0ae408bcdded232f21ce119df839712d223f1b738b778219ca4493b3790885b6a69c3080889a845ba1df21835a7884a7a38562565831f1987dc12
-
Filesize
703B
MD54d86484562fd4aeae61486bbbe1d3df5
SHA1919d91d377be1c93c866e0e015f3e37d93c8b5d1
SHA256e647002e46d580baa21ece3a23820be196e8625783a56b30f57d1cbf1677c712
SHA5128afcdec712f478e006d881544fe5af5812dbf0cfcb7820f187b64662a5adcd4063825017a3613c21550317104e5d63d71c31aedd0345e2c0a84178f490e77456
-
Filesize
5KB
MD5a0c04f2df6a2ce32499ecf3ffa4db6ea
SHA178cf714155ae3b996495e988457a56ce850f0a01
SHA256832e71f0e4392fcca8c9ba8f1b480a83b717d718fc508707badf70fe487d92ec
SHA5127f366ebc70e9ad20d52b9e91ad61c57725345a5e458692bd068775cd598e8924f6adbc3f2d81b233292e67653cb439faa5d44d44ceeb63e7dc236739e741bfde
-
Filesize
6KB
MD5ad098e8e01611cd59e18ad86e59d1be3
SHA133c753ca7090d3e961caee6e9459680bec7f0474
SHA256187be98d73aa0b940fb18d48b2915a4614fe2eb7464d11191a0d7cdf1c05b403
SHA512ec2559e11ce16c0bf5fc687692df0a44ef336ca7f126bcec58c4dfa8392a1670edca7f28f57647f7f100b67ed7d667ca580dd4bbd681e30d89af02d6b36d39a4
-
Filesize
6KB
MD50a8ff6f595e376b65b90cc1ea12e62f3
SHA1e8be372f6b74346d19df63aa372273028f8f54a7
SHA25686719f81cfcbf221b96b3d201142a227aaa3d90af42d6eb0a0a0e9edfae5e666
SHA5121a999e90bc886de9f27872435bd3f426558bbcff0766a13325b828d04a3cf26379a3b54df4d310d17b0c46c8ff00d4ac9df1cec91884aca589306687b55c409d
-
Filesize
6KB
MD5fa7debbcd48148948dd2c38dc68a0718
SHA14a00e32373c7b6697edb0586c2087d7eb2be445c
SHA2560f7176f7794d6cb5134040c4e7982950c51b8b2b3d93658ecea587bacf0cba14
SHA5122a67a3f901e7100bc0427c0c5fadc90f4d09335c5b129110c62b933162f66251b375059f639ca5dd8fd6578c18839659c50ede78a5631cc5cb8e53c028492960
-
Filesize
128KB
MD57f4848750cd049555643d5615d320a3d
SHA143b6092c2b7921efba56aeef054ebba6a6dc4d17
SHA256553cfd749c0d988da3dbe7ba45c5ae9b94ff976b8262f1dcb563e038fbc72d5e
SHA512880accc342ad35c7e118a7045661f8b1cfc2aceff4e695c98adb3c2bbdeba2da418770b3b1111cae281d5bf09e10cec3631a1438d39cd5966ac3267637455933
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e