Resubmissions
07/05/2024, 17:19
240507-vv4pvafh61 507/05/2024, 17:04
240507-vlj9vafd71 107/05/2024, 16:58
240507-vgyaxahg84 1Analysis
-
max time kernel
600s -
max time network
599s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 17:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.us.m.mimecastprotect.com/s/Pyp8CZ6DjlFqVNlXhzfr25?domain=urldefense.proofpoint.com
Resource
win10v2004-20240226-en
General
-
Target
https://url.us.m.mimecastprotect.com/s/Pyp8CZ6DjlFqVNlXhzfr25?domain=urldefense.proofpoint.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595750998799187" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe Token: SeShutdownPrivilege 1596 chrome.exe Token: SeCreatePagefilePrivilege 1596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4512 1596 chrome.exe 92 PID 1596 wrote to memory of 4512 1596 chrome.exe 92 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 1236 1596 chrome.exe 94 PID 1596 wrote to memory of 4912 1596 chrome.exe 95 PID 1596 wrote to memory of 4912 1596 chrome.exe 95 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96 PID 1596 wrote to memory of 5004 1596 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.us.m.mimecastprotect.com/s/Pyp8CZ6DjlFqVNlXhzfr25?domain=urldefense.proofpoint.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06949758,0x7ffa06949768,0x7ffa069497782⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:22⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2776 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4900 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1848,i,15179144982386087836,15810712897673893086,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:4908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3672 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
986B
MD54e446f217eb658f1c6565a84d56d4810
SHA1b0e63f000a715640e84745d05261aa6183c4b695
SHA256ef321d4fa80771a60202d040de7a202ed7b0abac3a877587de1214f8a723cbf4
SHA512b3e48b59d1d5cf24d3d346083770cb097cc5df13de2e62f0a2a38f550e68c646517e76ee25f1da48b9b8e6bdfee43d8533188e25131f6646140f088da0bdbeca
-
Filesize
924B
MD5bb102e61a450b809d2caa2c970256101
SHA185020334ad9ae5f77825511808acf58900ae17d3
SHA25694be57f89f51c34efd0b59ad4c98b32ccda37cd904be1099bf4d095db42ddb08
SHA512056370471cde22513cb4b4e8e3e96357125d71246e20041bbfd55bb51f9a97af78cecb9cbab7f89577d9b35960042e17e8aca1ea105adaab32bde27d7da377d3
-
Filesize
704B
MD5c90192f5f265cd374ecf5e62f9b0ac2a
SHA17cd3da4b64a7de857099357bab97432ee27a5db1
SHA2567d92f49dfcaee8ddaae96d1524d2a7f0973d8fb37203e9c2f3d63f601dc46d6d
SHA512731610ae59a5793e7b031afbacc10a45882e0961b53473117c1ef1f459a4ef0568684d54b2de4e1945771befba46c56a749a25b900e18e58c3db5ebd6caa2a92
-
Filesize
872B
MD5d53a845c2cdf146872b8465596d467a3
SHA1a6b82f3bdffa167c3aeeb6210b25ac3683038e32
SHA25685aee8255f218b71d22569d2e5a3b9cd2f573d2a2296faba438681550832b7b7
SHA51287a66c7516ffc94084ee0db4dda2f22c4df3fae75e154e6b7be427a06e317db1a9e7412912fdb4d50cd2a1644c5dcd0e410996005bfc3cf72bfac4ed34432f55
-
Filesize
5KB
MD5e9c3f9973d4a205a390ee7d85d2e2a5a
SHA12e6b13c61eb478d4797450831e687a222996b5c1
SHA256d5e239613240681d36b7d813dfabcd35d22bf8aa715d6d26349e0eac82b1b0fd
SHA512df82f3bab7f5566048a45ee9bbf378411337ab83d3bec6a1ffcdea4d609c2c68e8eafa1623a28e0a1bda5d8b9e739a05ce202682ece31d12c1bd4856301a0f33
-
Filesize
6KB
MD5af43fbac27994a7687cde2f7dc3e4a31
SHA18fa325f407ad5cf003b9887f12877d1240708059
SHA2562da47dfda6a141db99cf7dfe4bdbacae07ef3478b58312e81d8161d95c482250
SHA51221a907dcb7889e6978af59b228b214da49da6abb07d5e3e06f66bd75e409786b66818e0ab56a34adb878c5ee37ba97d57980003762721d6a61781f24a2a5b0e2
-
Filesize
6KB
MD56d6576753af0eb0496e25273888dbfdb
SHA138d8a921e3b1a19d11340e39857bb65325620eea
SHA256b8a6752b1e8551330f130e1fab7065e1af9a8c111bdfdc54723f6320303f9d79
SHA512e040360110b856330a3d48d31a8393aa6fca2d3e8d439b89b7fbbe11a58ae48b91e7b26d5a503ae5c062e8239cb88bafd3eb3bdec2528da549a2782bcfd4068a
-
Filesize
128KB
MD548773994576be402f79df1a4a59171bd
SHA1e97efa20cb41a9117371730c875befa887eba786
SHA256d5aacb8cd6970b7a80fca466b824cc9e656c2f55a103ece81b8e109ce40ddb17
SHA5123904a9024e22c2c9af3094e88a86de92eadc381b8b59f45ce582d18caf1f400c5117bd10fc07517fc0e2b90f40878548ebd6db13b7a610ed91b20b61ff06c867
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd