Analysis
-
max time kernel
1200s -
max time network
1091s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-04-2024 20:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1TU1EABgdQWh8KUQUHGw1UBFIdC1lXBx5SAgMDDgEDV1kABlFMUFIBCwoFWlAbWw5SCB0HXFIOHgNXB1IbUVMFVwNWVFMBAVIHRFAHAgYIVVYDHQMJB1AeVVAFVxtUA1lXGl0HBQYCWgMPUlsFAQ
Resource
win10-20240404-en
General
-
Target
https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1TU1EABgdQWh8KUQUHGw1UBFIdC1lXBx5SAgMDDgEDV1kABlFMUFIBCwoFWlAbWw5SCB0HXFIOHgNXB1IbUVMFVwNWVFMBAVIHRFAHAgYIVVYDHQMJB1AeVVAFVxtUA1lXGl0HBQYCWgMPUlsFAQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582914497370858" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4496 chrome.exe 4496 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4496 chrome.exe 4496 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3800 4496 chrome.exe 73 PID 4496 wrote to memory of 3800 4496 chrome.exe 73 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 3344 4496 chrome.exe 75 PID 4496 wrote to memory of 544 4496 chrome.exe 76 PID 4496 wrote to memory of 544 4496 chrome.exe 76 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77 PID 4496 wrote to memory of 4296 4496 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1TU1EABgdQWh8KUQUHGw1UBFIdC1lXBx5SAgMDDgEDV1kABlFMUFIBCwoFWlAbWw5SCB0HXFIOHgNXB1IbUVMFVwNWVFMBAVIHRFAHAgYIVVYDHQMJB1AeVVAFVxtUA1lXGl0HBQYCWgMPUlsFAQ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff91d3a9758,0x7ff91d3a9768,0x7ff91d3a97782⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:22⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:12⤵PID:192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 --field-trial-handle=1848,i,6033194846457912017,507184492408765037,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c322395cc7e23719d5c288ecb3e29ea
SHA1e4feb9d9e791c4206e35af11df8baf6719800df3
SHA2567d2267a8fd7028a3b480e4698448909c41acd145ebb3d6916e884c655824c628
SHA5129b40a828bdbcab6f1ae70dc3c4a558bcc177ce7b2586913381fecc11a5cbf1478823c4171d4eb432e585fccb0421ea4a15b475cf95b571359db6049adfbf3647
-
Filesize
539B
MD5b891e0960dc209e70db4c1033e402c91
SHA173368b280cc2637ea454d8c4f2f3cf5a139ec19f
SHA256394d8466009bec59f58578d37dd8aa7f7545a27aa1c24c4422e263fc33dd45f3
SHA5128b293607a9fcbd2fc2c40e196a396d05bc2e9bf950bdeb03f6d31672a2731bc071b43707403060d8ee2f3f9eb6d30d71eed3401004e024ceabff1d8d94ab1858
-
Filesize
5KB
MD544d0a07db9ed995294b9615ab0fbe59b
SHA122f3840dce6ae5eb92be5a6729dbc5328039a07f
SHA256679443ea695f838fedeefe50c957ba9e0b06b74b163e2adeac1dc61e205965a6
SHA5120574ec0510d795a9793745c79cc775c7faf1c8481d04a515fcbaadfafc0554be2d835a94e43aef1fef3cf984f9dca477e5a64d3aba4f8898beb1358770392bce
-
Filesize
5KB
MD5462827d0fda61b9eeb6ecb07451d282d
SHA1823d9c8649fc47365f86a1d28bc1af31095ad8ce
SHA2564f6a7162626cdace121c70f9d015cd3dea697e22c028e0e25f8281232178e003
SHA5128eebbbae637a5ef2621c1903bde989a695190dc329cdb8f39924e7286d9a1b44770483e573454389694b47bac8e905e9e4f5e6d0e55dfebfb702051e8a404adb
-
Filesize
6KB
MD535ac51fb6cc355c747638437768c018d
SHA1dde93994f338374691aa4cb15e2e463b82bc5faa
SHA256860098a917f70e87a0c66f1f8c708856d0e1786e11c7aa6416b5477feaeb2cfe
SHA5128ee9f1f0e3d61ef905a35395c18f1a15e5ecedf6a2750e8e5511d9843774e27e2628913b67ed2fbf7d4ec2e268e8a76b2db356a74c6620159b85f99bf0836328
-
Filesize
136KB
MD5f08e8e0763bb2df5a9024172d364c724
SHA18694e83bab4749ef72dffe3e0f8d95283f7f21f4
SHA256a7cc3de7ce5a6b254bde1f3d7b82884917bc8911157ce79ef7e33d4cc81a9bfb
SHA512ae45e8c48ca6c03ff7f1d717d0201dd33577c11aa2123d565d772301df5ecc09c48ec76cbcffe41af2f3c95de5a16040a408975b1c550e723ab72fd373694dc1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd