Analysis
-
max time kernel
53s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 18:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://APP.USEWORKSHOP.COM/SURVEYS/7643FD61-7495-4E0F-9B04-DD7F11721674/RESPONSE_COLLECTIONS/EYJFCMFPBHMIONSIBWVZC2FNZSI6ILPQWTJOELEZTUDFDE5QUXHOATAWWMPREEXXRM1AAK10TJJGAK5TWTJOALPSTM1GBFAYTTLNEKPPTMPRNU0YRXRZEMN5TKMWME5QBG1MV0UYTKRVDE1ERTJNAMRTWXPJELPEUMHKBKK5TWC9PSISIMV4CCI6BNVSBCWICHVYIJOIC3VYDMV5X3JLC3BVBNNLIN19--498A7C155B02D4FFF86A770C886CC5D4E134C93ADA6AC4B72FB25772B3F440AC
Resource
win10v2004-20240419-en
General
-
Target
https://APP.USEWORKSHOP.COM/SURVEYS/7643FD61-7495-4E0F-9B04-DD7F11721674/RESPONSE_COLLECTIONS/EYJFCMFPBHMIONSIBWVZC2FNZSI6ILPQWTJOELEZTUDFDE5QUXHOATAWWMPREEXXRM1AAK10TJJGAK5TWTJOALPSTM1GBFAYTTLNEKPPTMPRNU0YRXRZEMN5TKMWME5QBG1MV0UYTKRVDE1ERTJNAMRTWXPJELPEUMHKBKK5TWC9PSISIMV4CCI6BNVSBCWICHVYIJOIC3VYDMV5X3JLC3BVBNNLIN19--498A7C155B02D4FFF86A770C886CC5D4E134C93ADA6AC4B72FB25772B3F440AC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591466979525267" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4884 2748 chrome.exe 83 PID 2748 wrote to memory of 4884 2748 chrome.exe 83 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 5080 2748 chrome.exe 84 PID 2748 wrote to memory of 1300 2748 chrome.exe 85 PID 2748 wrote to memory of 1300 2748 chrome.exe 85 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86 PID 2748 wrote to memory of 2208 2748 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://APP.USEWORKSHOP.COM/SURVEYS/7643FD61-7495-4E0F-9B04-DD7F11721674/RESPONSE_COLLECTIONS/EYJFCMFPBHMIONSIBWVZC2FNZSI6ILPQWTJOELEZTUDFDE5QUXHOATAWWMPREEXXRM1AAK10TJJGAK5TWTJOALPSTM1GBFAYTTLNEKPPTMPRNU0YRXRZEMN5TKMWME5QBG1MV0UYTKRVDE1ERTJNAMRTWXPJELPEUMHKBKK5TWC9PSISIMV4CCI6BNVSBCWICHVYIJOIC3VYDMV5X3JLC3BVBNNLIN19--498A7C155B02D4FFF86A770C886CC5D4E134C93ADA6AC4B72FB25772B3F440AC1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91783cc40,0x7ff91783cc4c,0x7ff91783cc582⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1704 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4376,i,4510551007683062944,6441046279591568108,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD563448f0ad3f13535eac6649a5a2ff2e0
SHA1451c0904b4d184448a9ad67dab66c12813a0ab58
SHA2564b9cdddf3be5217426d16ce746d43c3053fc85aa4c96d98616646a293635b90d
SHA512c8af40c5e70849204f95cbdf04b022ef20132163657b13da7a0d0ee6fa3a13a77e0b86edad4130107cced7190b480792e0f41a1947d15729d973839b19fba906
-
Filesize
240B
MD56c9c6d0dc9bb00bc3e3c516ceafa4470
SHA1d67aca5b04406e9698b68040e04b47af37012158
SHA256fb8d04f28a83a13b50e0e4084ce373a4d83f84682ddfcf0876f06a379abb637e
SHA512b4e3b972605119b32dfa8ed0517d04e87c7761718a3cee84b8b3ff950d40296ec30e41a50797e79a8e35668cb2f494703220de663d61094728910485e65f9b08
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
857B
MD50b04fdd474c6f544a1f45b00d1f5effe
SHA1cf09ded8f782a077bdaa774d26a5a1397a616c27
SHA256855bc35342ab72e8c594bf100307f869a1600654d373b9ab080766a66690d05f
SHA51293d3e3309964520c66e14dfd2f4c5dfea0b28ef734b090c5ad264ffc464e732528fad997b643bcf41e63ef6a4879b84973ff33c737554406c67faeb14a166a82
-
Filesize
9KB
MD5b82cc7ae23f3d0af06fbe21b97d41ce5
SHA19215c4f9703ddacee46461b1edd58630c15fddfd
SHA256d3fe6a0e6340a3b54cd04705ca61a716a6f0519570c61f80ab29a928f7137b2b
SHA512c37e071ccf319d3ebb1c04657db1a51b5940f3dedfeb9c2f292d80e1402b722a01a2fd373d0b3c6e2bb8f756d6fad024ec30bae92881036198d2a58365d56d3a
-
Filesize
9KB
MD5e3966a7f1ac35f91511138a960da5917
SHA16ac15bd3bb9636f675537b2815bd1ab7575b1533
SHA256d50555474d48f1a6ef5b71618c2c91d668123ee02f6c8cb499d3569ad913fc78
SHA512e88d4cddd58a6d057f502b32bf0170be2f9f551c13a105f4c1793ea8ffb7bea811551627b2aca5b1f3d9ea27d3b1fd74c6d7759aa11b024a8dd75cf8eff708cf
-
Filesize
9KB
MD59e95337fa62bf473a82812960c2ba53e
SHA1e2e7dd3f82c80628218e832eab6c6684e3bf9d64
SHA256f44e4962290153751064b6674fdc4951f1986c02221f32284fc3e83b204c9017
SHA512a0adeb88c311790a80ccc88f0f7192645b79c5b55059a8d1cfe3bcaf9f58d5e3d2bfb72b94aff90fe7972e4749bb182618d3aaa3cee72e3bbf18a9ecb21e7a36
-
Filesize
77KB
MD51304f5da8ee7642a88a8dcfe48bd5570
SHA1c6d929be7c3cf336e0f4a135a34c0cf3ea1bfcf7
SHA256dc1c9e4a9cde8092c33ec5336dbc48df7754cc02fdd45c562d794cfa674241a0
SHA5123a5a2343ec3c4b7709a793fdcac86616741bb5e2f59351ccdfa2f49003aab031a77c01a86aead5d3ec3edaaa3e8ee9ac25a6f59ad4449bcc8cf0a5f5d283cab9
-
Filesize
77KB
MD51ca8d687c66ab7a0d61a863db15ede78
SHA1dad0acbafc5c853a6c695e591b18ca422cb46a72
SHA2568c94eddd8dd6994cf0c0135fc1aaa61adc85d6807229c5941f6e08fa6ced88a4
SHA512f49ab105b640f3c7bdda22dcb5030a94193bdf0503f12ed4e8d0f880c94c950be208b97783bfb4da318625a3f5e597b3a9a87f9ba3917179b9e2b7753b8db1de