Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 01:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.evolentswag.com/?syclid=c3409c41-38b1-49a0-aaea-244b8bda3e87
Resource
win10v2004-20240508-en
General
-
Target
https://www.evolentswag.com/?syclid=c3409c41-38b1-49a0-aaea-244b8bda3e87
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606434341573466" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4084 4404 chrome.exe 83 PID 4404 wrote to memory of 4084 4404 chrome.exe 83 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 1796 4404 chrome.exe 84 PID 4404 wrote to memory of 4868 4404 chrome.exe 85 PID 4404 wrote to memory of 4868 4404 chrome.exe 85 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86 PID 4404 wrote to memory of 3244 4404 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.evolentswag.com/?syclid=c3409c41-38b1-49a0-aaea-244b8bda3e871⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94289ab58,0x7ff94289ab68,0x7ff94289ab782⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:22⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2424 --field-trial-handle=1892,i,12194382450970867502,15970790496743765227,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD575613f948933c3c1d0dfc666eb446c84
SHA1021858f17fa82943b6a4c9530cf26b1f9b68ff04
SHA256fcccfed0f233854b178b53b9ddead879751d3d4b54d9d5e205b56fff3b43f6d4
SHA512842b01b8b4812e5f35dcdd24d84bcbdbd2525a4eb99a5be0732133b928bc46de54353f3a800b9b715812f93acf255e10cc9af73878bf670e72c7567104576ae5
-
Filesize
2KB
MD5f433faf2b94983e822bc8e2f89f5e216
SHA161a15177738f07b91156642e939bf754cf59b8f5
SHA2564c32d1bc0757578642fe5d2eb12203cdfbb277eb4ea08fcf1d80dbcc026d0f24
SHA51281bfbed5c926fad9475a879d5ce13a04adf903ba2c318abbcc0fca0ced5017f75ce0a305121785081dc1efbdeff942c54479c6a654bf72b48bd6f2f15f91dd1e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
857B
MD51002220e8e2aed97eebb415d6f1afce1
SHA198244e1c674b99910b8baa68b05df17d92495a75
SHA2563f424aa72ce1aab25e8d13336dc706fabc553deecd2ec71680d78feae31d569d
SHA512c8b5d582f5afd4346cbbd309b94757f0b92d59bea84b751dabd6867452bfc8c8106ceaec4f345b19383edc7b7dc34834bb278af202a0f38e4003a33c4eb30d0f
-
Filesize
7KB
MD53324338e07cb082cc066394d378c7d41
SHA1697f09c3858429ee93ee6323ba28d9c23fdbead0
SHA25675d3b2cb6902d79f97385f276b0fc4a298be44633f430d6ffcf281c3ed8e185f
SHA512a3374287a44d5ede91eb4ba38cf0b3a1ac5083a36864d25794df2897b88c640e81151b87e6ad24e52309367d73ad77b91a0cb041b131cdca3957bed9935b4b88
-
Filesize
129KB
MD5f11935279d08912ace15a790a1748c0c
SHA189587f299250189e62624afd82e5d85a865f6092
SHA2568b6099edcf069a4c9ca766621047a66c34446c11a06ac72a075bdbcfff5ae78f
SHA5121a734ee464dfb03d81a917ede037cc37c04f536cee7db6bec0a6962f6ff2da6b7a176e62c6e291a47890052cb50c710358c68b23b1359889185abd7eef0b5a29