Analysis
-
max time kernel
24s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://em.ironcladhq.com/u/NTI4LVFCSC04MjEAAAGTP-ZNZXvdehl4iEZek334ACX7npHw9HWNbWo9imut2BPhpToknfCRdof_iXTSR5S7_YSe91A=
Resource
win10v2004-20240226-en
General
-
Target
https://em.ironcladhq.com/u/NTI4LVFCSC04MjEAAAGTP-ZNZXvdehl4iEZek334ACX7npHw9HWNbWo9imut2BPhpToknfCRdof_iXTSR5S7_YSe91A=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608890374460153" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 824 chrome.exe 824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 824 chrome.exe 824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 824 wrote to memory of 4748 824 chrome.exe 90 PID 824 wrote to memory of 4748 824 chrome.exe 90 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1184 824 chrome.exe 92 PID 824 wrote to memory of 1852 824 chrome.exe 93 PID 824 wrote to memory of 1852 824 chrome.exe 93 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94 PID 824 wrote to memory of 3232 824 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://em.ironcladhq.com/u/NTI4LVFCSC04MjEAAAGTP-ZNZXvdehl4iEZek334ACX7npHw9HWNbWo9imut2BPhpToknfCRdof_iXTSR5S7_YSe91A=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e939758,0x7ffe6e939768,0x7ffe6e9397782⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1840,i,8768311487473973347,12667282910770534584,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD51c226cf948ed962e09cc994fc676f8b8
SHA16e1cd580b99781ba0ced39c6d34793dc4905099a
SHA256b520a5f8217f99e0670314f69a17a7b1024d0b50b365cecaf7699747ca5a7bb9
SHA51255164d869f2a8bc009e13df818494d576e6e98f030144c434524851a1a53918178a9f798c3445fe59792c04a17d81975e6bf56dfed1b79abca32b03c1d6f792f
-
Filesize
52KB
MD59422f9ad492344fc1e3a93385ec8a7c1
SHA1184e223c9ad6f297a0aea4ef3e95162e6f50d9ee
SHA256ef9d52f6f1e8b6fb6f6d53e5bd5e82bb455ddadbf9330babc7054b650fac1c7a
SHA512cbe783ad0c3e12490bf7e35ce7c5de9e06bc9bbebef6717aec7fc7edcbd9d6371c3fde2b070957f6ae3e81b3ef7a7123b596a7840cd46733a0bf09c0239afaa7
-
Filesize
55KB
MD5407460fffef3da0f06c0ef69899f1eae
SHA1e59b329bc6cfe69c6596139bca055f1a895c3373
SHA2561255eadb158ab3b4fc6cab996e66ae2afb15a473cd6945070c002d1320f6a12f
SHA512a3255668d0ed7f897464835af991e113f2a4b1466f87f6e0e2b8115197e94272d4925381eb5b142735376b8b765564ef294ce1a3bcfc1ddedbd08030f1bfadd3
-
Filesize
288B
MD5a3bce03ba677a10c2b77579365cdbde5
SHA14e36bf1e13e5486562b1804f3ec1a9b64fbfd3ab
SHA256f989ae924aff52656fd2f17e1379509a25266a5e245c15723fbcdde8f7b60dc3
SHA512e121be2013d0323c8665725c8b8180125d5b0c5a8360cc2c831907aca7d26b266f24635f67c580abad985dbcc40f80509fd165226782a272975ab61120ac8aee
-
Filesize
1KB
MD585036f48e536d8615cb3c02e10b82aca
SHA15da8e2accc16031046f04822cde4e6e3d5a1b480
SHA256409d5822eb73e8472a74ffc456a524010db48f22eabdd522c98fe106a1589e5c
SHA512a5f21dcd8b3002814d8dff435a25461e4eb135b02f203bf877bb150371f6aa60fbf77bd40b4aa8a61961db6732ab5bbfd3876019707287b547ba4306801afb80
-
Filesize
1KB
MD5e3a5b472b771f39f1d36ca6b864755f6
SHA10b0e24daec16f41fbfd972f467bc4a88359a493f
SHA256d7b3eecf607c8fb95498cd4fe04b1ba294a7c161577573050648fa44162050c8
SHA512fa85a6974242155e3f1957e67c79fee5a67e52d8f901816f0528bbe465e61e46640ae8f310b1dd228d6d02f457fb4b2026b74557063fc1769342484304d6d5af
-
Filesize
1KB
MD53ed73a6e4e3c4249c5288124c6b34e7b
SHA13d97e712286949295cc743be9f9ebc3fd78f0c66
SHA256181e37e9ba3090a61c63c3275073692e4e0ff8391a614416367da68220805e42
SHA512b144e5813ef4e9336c50fdf69d88a584f66cdd01e6506be75b11b4700a1f906cae1b0b8948650e24bbfdf027f8e83256bd9f97f9424aa0005b1e5bbc168f826b
-
Filesize
6KB
MD5d0c08b551893f92fa979f05b45300b5d
SHA1d76cbc340b5098d806ee79e61fe531404efaaa5e
SHA25666f0ae94844b6dd8795a83f23c15652a32d34cb5cd92d699681949aac32cbe53
SHA5128c3212bcbf865ef13bc6c6417f3ae65a11424ae970c729a3bd8774b9c3dfc4106423d454f3c92096f2adef39d0e0b6c3d17ace998ed31bc6e54956f6fea5f97d
-
Filesize
6KB
MD59d7786abc61118dcd7b30e63bef6ae54
SHA1636910d595afc01f4192aacf9d49fd64bbc169b9
SHA256019851b3038fc8c9dbcf4a06aab4d931850f39ee1adedf9b766dd210bb075395
SHA512da2366b6bb86911bf809d8db244464fe3e0b2f35492f1c294fa83b7298e0e1a9b874c0398d62b13f66092da52bc91fcfa2c39f3bbc8d412a793224e0a5eddc9a
-
Filesize
128KB
MD5de08ff88914e50935a4946b751748d46
SHA11f1206a4afd829eb43d6723c5e44ff867c2a5974
SHA256f93de14e17baf7fc6b97a55b2e93f859ca9190330432296d8d8215642f79f991
SHA512b1c8f14bfbb9ccb085d31b2eedd3038bb0b546582188363ff9be4102536ae2534b5f885de40d02584378709716775797dff0a26d933c8510d7b4be5d4399ebfc
-
Filesize
128KB
MD5c2ddfc4d0c17cabaac713a70ce4888af
SHA1a179273408946757e33fc5af5b1896395dd61d6b
SHA256ecff6fc7fe714f4dbcca8fa05abf923b32478dd8f5b4dd12cb6f4f4671653205
SHA5129a8d2a6f72db3ef032d9b9a5f406a07f85087866d6de0663952bdb2d0e1a0c076637ade8a2a5305a2bf1bd4b551c5a38793e605100db8639c055463f0c7d22fe
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd