Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://interactionsynctwiliocallout-staging.azurewebsites.net/
Resource
win10v2004-20240508-en
General
-
Target
https://interactionsynctwiliocallout-staging.azurewebsites.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606427075203518" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 4936 4608 chrome.exe 83 PID 4608 wrote to memory of 4936 4608 chrome.exe 83 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 1896 4608 chrome.exe 84 PID 4608 wrote to memory of 4184 4608 chrome.exe 85 PID 4608 wrote to memory of 4184 4608 chrome.exe 85 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86 PID 4608 wrote to memory of 2440 4608 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://interactionsynctwiliocallout-staging.azurewebsites.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd88ab58,0x7ffdbd88ab68,0x7ffdbd88ab782⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:22⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3492 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4476 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1884,i,82067562982423308,8339003576584446811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD53446ced5b8f8bb2c4716d3c23142c848
SHA19d6911df9c542354546e233b9f8dd5f6a854b22e
SHA25607cde38c7dbaadf4fdf4bb061b02663c89c5cc491de6f7a5f59a390952fbd199
SHA51214b0bdd1919530a02c28d3c34edc210499c69b89ccac83610e4b15501271b4af9c21d3f63be94a9d4cf6b39895f1e83d62534b0261c1180af24e07312dddc93f
-
Filesize
257KB
MD56ee3319e403aa37a342251a1d57b9f8f
SHA118528279a3dd36e1d1a82e681a62f1a2847208e8
SHA256bffff86c7d060da6c5fa95e33e4a85dc325cd980f12cc831ee07f98afd75414a
SHA5129ece28bcd3eedcef3ab5e1abeb0a64bfbdb32714b38c158604e157951c2f7cadc82aa63a220405cd3ed6ed7033322b7ad266c6de3b2544cb2d4e9b35976d17b1
-
Filesize
144B
MD58d59ea1ad2a17332a653b0065c8e9bfd
SHA142b9c09cc526f0e6f667896efdf354c02058c3ed
SHA2564aa8dd3be6d1a3add49a02505ab748210b516ccb8a7795a9015eca055b125f64
SHA512a0eaedd79db9040f9485c9a48a4bc484ce7818d4b8245143777fb816e242ae7ebe0a5a093b99845ff1a15c14f9c5c417ff9c5eda744eb1bd0870f9aa3f472194
-
Filesize
1KB
MD5e214626f202beed3797f1a98ec0f61ae
SHA1f605daf5340366167bbf2728f68904622123a157
SHA256500e5217b63b3ecfde985de06bf0ddf5c5869ade457855a78d7e5c7298d33df6
SHA512cf8a2b871390031f556349ef5e096fb5d4d00bc47910304c7f8fe7cde3a34324e87c9ce2de812f89b4e5975f4914c7beb3d854b0437403cffa703169b8a15e2b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD53e6da0ff2a0eedc8dc33aeaabfca4b0e
SHA177b1c244afa0e0aa3ed9f80dd27e53fb730527b2
SHA2566ec09daff317223ade4ae430668a3bd119974a3a8288e2b73a31d69ba4872b04
SHA512a0b4557451cc6a718e9bfea71e4c602850b6c10f89028b8a75fca86b69c8ed2369eeec690f7f7b190c7541f5a030891543378aa8dd7ea65cedf6f8c9dd44ebbc
-
Filesize
257KB
MD57098e6b9e2cd9edff2dd91473cf65702
SHA17b8dc665f792caacdb5ab1eee5b9d884e4af4263
SHA256d75d819b4c388ccc991b630eb639344f2a044d1eb4f08d85b8bf226cb9742a95
SHA512ea724ca1f03f6c9a9848f3352d2447a3751fc83170c6cc593e899a74151b604ab567d5d9bc482e010467f46769d4ec8d8f4cc14affc8eaa9e1ebd60c59a58a8a
-
Filesize
257KB
MD58a26f8c302a41110c8df639210359488
SHA1137cc6c13a668753a0cd5547e4680c3072890aff
SHA2567441c1f19acc2dbd0945620568deec794773e65cda957da2d2d1761f21fe2184
SHA512bcd3579b9f1772d0d3c87d74da3764379fb529e1acf7882c402b983b28f047ed3b209a3ce3ee9be279db0d3b807824e2dbcd267c8be243901219ee411f5d29dd
-
Filesize
277KB
MD5cc2f41ffb0a8bae4f5625aa6782a0576
SHA199773199dfa1d2b54d6b787efce655d7fc45993b
SHA2563be844a6acdc5a921786b12c621505c7426276917cfd7d05acbad8502bcf1966
SHA51291aa15376d01e6b6a88529acf9dfa8667a7a053765e8cb3a3816b535547b6c04358d7ed17ce7512854d08f1a18c3beb1bdde32b477b3d7faeb82239c990d8c90
-
Filesize
88KB
MD555dbd51e6fd2575ad0e59686772e9c4f
SHA1961e226ef0b3af716e7883b26870355bb75f0851
SHA256b51c25c7307291b58fd999aeca64de8ef6949b72e8807f690660a8bcab56b710
SHA512fba86c186b2f19d350cb703bfc062af07da81e9941c1dc099cedfd8cc84ecf0d60c9be7904ba5b5663589daf7bfb805081110bb7efc33f7a846343653c09dee5