Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 07:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cW7l304.na1.hs-sales-engage.com/Cto/I6+23284/cW7l304/R5S8b41cvN7xvbD72d1d8W3BPYfB3M11bQW3M10N51Q6f73W3H4N6S3yNtSSW3GLbFH3M0xBvW1V3H7m1Q6BbVVhPQZH94pp0-0
Resource
win10v2004-20240226-en
General
-
Target
https://cW7l304.na1.hs-sales-engage.com/Cto/I6+23284/cW7l304/R5S8b41cvN7xvbD72d1d8W3BPYfB3M11bQW3M10N51Q6f73W3H4N6S3yNtSSW3GLbFH3M0xBvW1V3H7m1Q6BbVVhPQZH94pp0-0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582448926782183" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4752 2220 chrome.exe 90 PID 2220 wrote to memory of 4752 2220 chrome.exe 90 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 2448 2220 chrome.exe 92 PID 2220 wrote to memory of 4432 2220 chrome.exe 93 PID 2220 wrote to memory of 4432 2220 chrome.exe 93 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94 PID 2220 wrote to memory of 4848 2220 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cW7l304.na1.hs-sales-engage.com/Cto/I6+23284/cW7l304/R5S8b41cvN7xvbD72d1d8W3BPYfB3M11bQW3M10N51Q6f73W3H4N6S3yNtSSW3GLbFH3M0xBvW1V3H7m1Q6BbVVhPQZH94pp0-01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebcbe9758,0x7ffebcbe9768,0x7ffebcbe97782⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:22⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3240 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 --field-trial-handle=1880,i,2822555234856700152,11795671491216071557,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4744 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572B
MD5f46d8ceb780cf86673ff3956f76e1454
SHA1f88812864c798607bfc3e1b7418ee8873098769f
SHA256ae3566fa18ab0c42a21d7e4a4b48f3b04e4806148debd6816c32f31da9faab3f
SHA5121b70c2fbb2c1ab8e6288b3d1b1a8ac660dcb74c682bf5ea1de9c3be7353cde8bd0c16791c99664b9a2fd67465f7f101a749586afa5462d3ebf143b031bfdbf52
-
Filesize
986B
MD56a4262df946a4c3341499bce80b5834c
SHA1ebc5f2563bcda0a83747edb2be9895b941953e1d
SHA25639a66323a6d9ce3b77f0fe714591892aaaaedeffd2bc9c1a856c2bec11624b72
SHA512b11aac197f683b90f8f715645d9a6c18520babc55ea3299b08d308240a6850980177a6809a70e2a193dbf07a72bb6bf5421e5c3625c49154a096ad6c13383220
-
Filesize
6KB
MD52e54cfe4fe80d19fe268ab452e8e4a18
SHA1c22f3c9123bbc3cd3020ae3104b0396239cac7d5
SHA256dae9f861f8b800922aa308f3da9fc9d24ffd0c2f92e41e0b3e40e10f054d5f17
SHA51258c2c7a5d478d9735b7963e74ef582d1c208b06d76d5e7e7129a95cb3108b95ec90b3d72b888b68fe9b6daef3bfcbbe937cfab4c0e077f6eda835486582809df
-
Filesize
6KB
MD53a10d1f2d4b6e106c5c489135dda83a8
SHA16edb6b874904fcc5fd589f38d12973a5355304a5
SHA2560fbc3c14212bc0947d760ef03888086fd380a11cafa2b55cfa6631dd95e117fa
SHA51236fe96b007dc3038dcc3ee56519cc54f1c76ad0bad3750665185d8da9783a43d720143c88700d14d6817ae26832358b94884a6144fc1ad2021263afc9ba7ce94
-
Filesize
6KB
MD54585d9c4d800ef19974d4d87b61e4b0f
SHA1a6b80e749cab765e9e7d7ed3767a02b828d11387
SHA2561dfc881beb365b3d43446aa6054050ecafb2ea361a45d0b9417364f039debd15
SHA5120322063ee96ba08ac45621ea58e8d5fe784772a5636cdd8282fa51317c390894b24666d9fca030f119aade59f65b2b4defd37fa15d5fb8e885a3de8526c4398e
-
Filesize
128KB
MD5fb6e2bbcaf56f9b07c9ff5b2f8ab653c
SHA1e977b024d4a37dbad5e58219d53cf98e331edda6
SHA25600f2812bdb68eed88e84252821ac30f953c2221b1484d3150ae54798c87b2c39
SHA5124f824af2e768487e9f7bc4a78eb9de0603483265ff1e1a499e733a6ef7d295bb9e4124a239162bccfdf910afaa2f4dae7f0f8640e57165c7867ca5481d57983f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd