Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 15:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://publicportal.airplus.com/public/ClientEnrollmentTransaction?key=e88ed827-231a-4fa2-8400-499c9fe752e2&keyvalidation=b2f7eb15-410b-4c30-88ba-edf407304fc0
Resource
win10v2004-20240226-en
General
-
Target
https://publicportal.airplus.com/public/ClientEnrollmentTransaction?key=e88ed827-231a-4fa2-8400-499c9fe752e2&keyvalidation=b2f7eb15-410b-4c30-88ba-edf407304fc0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133573220793612621" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe Token: SeShutdownPrivilege 1220 chrome.exe Token: SeCreatePagefilePrivilege 1220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2832 1220 chrome.exe 92 PID 1220 wrote to memory of 2832 1220 chrome.exe 92 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 5000 1220 chrome.exe 94 PID 1220 wrote to memory of 4748 1220 chrome.exe 95 PID 1220 wrote to memory of 4748 1220 chrome.exe 95 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96 PID 1220 wrote to memory of 4400 1220 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://publicportal.airplus.com/public/ClientEnrollmentTransaction?key=e88ed827-231a-4fa2-8400-499c9fe752e2&keyvalidation=b2f7eb15-410b-4c30-88ba-edf407304fc01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffea4379758,0x7ffea4379768,0x7ffea43797782⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:22⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 --field-trial-handle=1868,i,6938167891111103482,8198414676946751019,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3652 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5aeca0f310bb96dd5933cfbe06e5d0eab
SHA15556526ad246d71550f603a53d62b6c509b8d4df
SHA2569cddce19efafb63af3a788c058413ff8de7d0feeae0179a215618efc7978fec4
SHA5128fde0ae1059a4b86395d5b8d7eb7ca107c507a3fffb1415ef9908dbdabc11b2daba92810ffc4c69a6a2451a5c411c9124428800a7582167df607c0be26ece5cb
-
Filesize
938B
MD59a54fa74cccf5dfc1c6ae8db39815f65
SHA16c873869af09b0bd4172f8649ca4f85d5a6477e0
SHA2569894a6af8f12912dc1f4c0e45e5ecb5e5a51687db34cf6b69d55a9c85cfb4732
SHA5124bde5c275d232a5d625e38b7ae22e348d054c9a26dd5a6be84b64537f903a8aa86b4f5cc88687e5fa1e53106dc237a369214fcbfa489e5839c64e477fd95c4cc
-
Filesize
705B
MD52112e35deacea05cdb0ffabb14f07957
SHA15cccd41a23992cf23a7273ffa5ecbbc405faf2a4
SHA2567335e9559b6e8cda809f79ea7037c9bb490aff451336c00cfc3b480443d182f6
SHA5126841ac8f198e5d43a65432138766076b35aed369ff3871000ed894e2b5f33cc078787468df03d65405f27d1bd8c86e320d98b44a250400d5f879db4f5e78cf00
-
Filesize
705B
MD5661d6fea7b4149f49c24e7480c79a738
SHA109d4261599e91d3d39411f1daee57575e91cb75f
SHA256d7ae4fbbe8e56433697a2e994b72a113e022bc052b48921e9b81428d90234c1e
SHA512163b895fe998751a015d49177c548f6974e5f146d50568f6f9512bd61962564aca6d2a35a92e9ea1deb8ab1232ca8f127446b2b9ac315b663ab873eeb764d61e
-
Filesize
5KB
MD56ebcea7804a07f47436f5292476432d6
SHA1a8cead37ef58d1fd2e583ac9b54b6628715e8ec3
SHA256ad1df005891effccc583ce64c4b7bcbdf2ee80b895592308c44b3356c99f5a9c
SHA512e87337a18cae4a419f3365101e8297183a9edcab7f0e53f036486b4edc0ce6f267d58394df0b1eed2910a91b157e8512436156198441672f96a1f93474a3b1f3
-
Filesize
6KB
MD5d63623e999e7f669333b6760f6787bdb
SHA1a678485a557691a5f33db931f6af1bd7e8dbc738
SHA2563974e056ad4514836f7826554d7f60ffa2c2cfd1067b0646e860d7bd0281e57b
SHA512301055dfd94bb43dba4a942c2bf0eac6fecdf8478c4c67916f8048e979460662bda68965293f92cd9c0c996018caf95e9fb5f5a44aff3eb0a9278c6dfee9351b
-
Filesize
6KB
MD520712715286a543751c6c98bc008c1dd
SHA101f82d57006da565642a3a619c455d3a3a10c3d3
SHA2565a3e988c0ed6da3696c1a934c00a335c4111fd989df358f208e5946d93a7287c
SHA51258461db73ff67dfbc0817801f609388fac190a1865396d2af9742d297c85c3af28e7b90db0cc4d8901c6b6974c692cf50cceca8e010204c8e63c5c48f12de63f
-
Filesize
6KB
MD518b2669f69f5948443871bcfea60c951
SHA1865be0b37183b6c1eb9b405c6bf4c87da9e9c383
SHA25692e3491dc05ccd1916997749c2e78ba3220552e068b8ed53a53d289fb2cb9338
SHA5128553d3d18f1c5822a279640e3e83179c423a0701086fdfb9adf603dfa5400da655ef90d60c71f10f1a1b40e218bdedf44715e4c8b6a23ee1f3639771cbb45ba4
-
Filesize
128KB
MD5cde01eb724e26714f2a09c327c8a1c42
SHA1ca6b18a3362140be7e5a6745fa41724510624c95
SHA2565b134c5cd95a035a29925aca49b94b48d32e1cc3f0e5f89c7e6221e1e1400bc2
SHA512ab353fc8616f237ccdc007492793d8565af72234f52d152d4d34735046de6121ac18e97e5e481e6f25a7b1b3cd0c7be7d3ef37441acd8162c7fdac66eb4d64cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd