Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.mails.microsoft.com/r/?id=h1433e44e,368423ae,36842887&e=cDE9cHJvZmlsZS91bnN1YnNjcmliZT9DVElEPTAmRUNJRD1sOTUlMkJyOUY3WUVMblJFR2M2M2RSd1pmbWhFZjdiV0xqU0daN0xXd0ZHMWMlM0QmSz0wNDY5MzRjMC1jZWZlLTQ3M2ItYTg0NS05ZDA2YThmODU0YTYmRD02Mzg1MTk0MjI0Nzc5MDc0MzEmUElEPTE4MDE1JlRJRD0wZjhkODhiNi00YWI3LTQxNWEtOWY5Ny04YjY4NTcwZjYxNjImQ01JRD1JcmlzLVBvd2VyQXBwcy01NzUwNTM4OTk&s=qqHOD-3F1f2zebAmiIXLkovEPqNDsbulJSBvV-zGu9E
Resource
win10v2004-20240508-en
General
-
Target
https://t.mails.microsoft.com/r/?id=h1433e44e,368423ae,36842887&e=cDE9cHJvZmlsZS91bnN1YnNjcmliZT9DVElEPTAmRUNJRD1sOTUlMkJyOUY3WUVMblJFR2M2M2RSd1pmbWhFZjdiV0xqU0daN0xXd0ZHMWMlM0QmSz0wNDY5MzRjMC1jZWZlLTQ3M2ItYTg0NS05ZDA2YThmODU0YTYmRD02Mzg1MTk0MjI0Nzc5MDc0MzEmUElEPTE4MDE1JlRJRD0wZjhkODhiNi00YWI3LTQxNWEtOWY5Ny04YjY4NTcwZjYxNjImQ01JRD1JcmlzLVBvd2VyQXBwcy01NzUwNTM4OTk&s=qqHOD-3F1f2zebAmiIXLkovEPqNDsbulJSBvV-zGu9E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608879440249367" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2968 chrome.exe 2968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2968 wrote to memory of 4400 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 4400 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 940 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 2368 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 2368 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe PID 2968 wrote to memory of 1412 2968 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.mails.microsoft.com/r/?id=h1433e44e,368423ae,36842887&e=cDE9cHJvZmlsZS91bnN1YnNjcmliZT9DVElEPTAmRUNJRD1sOTUlMkJyOUY3WUVMblJFR2M2M2RSd1pmbWhFZjdiV0xqU0daN0xXd0ZHMWMlM0QmSz0wNDY5MzRjMC1jZWZlLTQ3M2ItYTg0NS05ZDA2YThmODU0YTYmRD02Mzg1MTk0MjI0Nzc5MDc0MzEmUElEPTE4MDE1JlRJRD0wZjhkODhiNi00YWI3LTQxNWEtOWY5Ny04YjY4NTcwZjYxNjImQ01JRD1JcmlzLVBvd2VyQXBwcy01NzUwNTM4OTk&s=qqHOD-3F1f2zebAmiIXLkovEPqNDsbulJSBvV-zGu9E1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff530aab58,0x7fff530aab68,0x7fff530aab782⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:22⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4016 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:82⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1860,i,11279387354958898481,1994409563356176734,131072 /prefetch:82⤵PID:5452
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4188,i,14221647728265121051,6840906015709541562,262144 --variations-seed-version --mojo-platform-channel-handle=3764 /prefetch:81⤵PID:5288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5c35e24c5e4e10b759d75e901b40f2dc1
SHA1463aa6773964adbce91defdfaa22630f37d3d0ac
SHA256bfc118a94dcc31366be18f451921bddd31f7399242002f53f030a9b45633f944
SHA5127855a123c78b12439c70777c71c5689acf7579006c856b6cd87a0006f8e6ebca35eee3b7efcfc93ff5b999c1c23c1d6024685d42b69f9ee2e3d126aa4ecb0a07
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5fc72374869ea2158ec8002cad488e7c5
SHA1103b0a497e820009ad90404cd69a5b13ac342a96
SHA256c915b49f02432ac44639c56fe01b136c0f564f6bc56db24609f844598512b8ac
SHA51254e282e1ef381b9e8d42eddbf809f3edeb1dfceab880f4947c6ed71123398f50d9f3f51315d20488d573b1442469606a8fd66bde8a4356bb204ee2cb193f20ad
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52ea94cbd6ccb8e07691cb18e8c6246d4
SHA176727fa8c17e7bf9e8fd1ca5c551bd5d162f5c2b
SHA2566fd66cb00f624e0022e2d7482022a26766a54aa2c6b070f4c2a894199f347307
SHA5121bebc103e01fdd0d4bee5daa14518b0dea4732e4aba5daf4f9c21fd7691c173bb412bd56f8ddd7cc3cef1e5492dab79529dda117a1c352e27fdeeec98311c189
-
Filesize
7KB
MD5651d3b749f189d0ccff4a878130964fe
SHA1120542e344eea62897a56d72e9dd1088748202b5
SHA256268d62a335fc5752570c4a2c8e53705f8a865134aff9afc89136f60123ec8c23
SHA512f5c49e46dd4a27df70bf8b3fa413a60b5907c6920e7c9ef7ad239bb56d140e10823cad964e3c3a30c4b6cee4e2a80aed003af0d4d3a378d7cf3684d17141ee00
-
Filesize
7KB
MD5fcbd9528c4935c595c1633b2a7fffae4
SHA1845d2238a55ccd1808060e2442e6bb75466350c1
SHA25674c8cbc3aabfb64f37340375a861812e0242d49362e150a50e76591b75e6f37e
SHA512b90b8f7702b14ba3388de915d1da423fa6c3b7aeb8e43566db8693d290cc0ce72e0520c7d2188ea0248bac8614710f7f15f10878f9ead335155828c916ffafc9
-
Filesize
255KB
MD5766f5ce7875cfb62c74edce32a37ca8d
SHA107cd11ddb0a5b910407905e7b19b60be54416f8b
SHA256d4a269f031aeb1b321d3daea8fd03713bbe9f964766c9d3383dab035a076fdc0
SHA512708822f3c3ab7c2ee6d1d96cb4808c0aa9bb291e925b24f360657b484cf7ce0a59f421b5e15bfb246f3ecad46315652a041ab547ddfaf0e1019b03270b2384fd
-
Filesize
255KB
MD50e5889db5abeb69cd4c26c079d5295ec
SHA1ed22c49fd76edfe7655e0783604b08735d68939c
SHA256722ac8ec60e2964098a0f3d67526e42787c9f8aa3fdbb56ad11d388cf17d7efb
SHA512bb02275a9fe8d52c37aaf93674b5cd5c4b0703612167bcdcd320e2b04221fa7c5a56cb543f96ca14b7ffbd00460b6c78cbb3dffb4c46f3258b1bffa35de9f80c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e