Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/05/2024, 20:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure-web.cisco.com/1AmpxiQpBC5N3zGlWtKEfDw6cr7sWLH36JZtg5ir10WgdIon4bP9x44HaRTV8RB7BB2xmhYp17F9IK2JT61KfYBbcEzLvLWOBPusqNdmCz4mn-7hMinpu_CqPS9Q_LoLjRa6Cze1cEdSRFcctYRcA2DHfn440Vhpfg9-HmAkH3r_3IJDP8VdK7bZxGhRNNh4bc0i08yCTq0PAjBpqfnXxbGwQcyZ7FDW0vRcXMWLSarIM6-7Qh51cIj5ZmWn_Q_HEkTxSm_5TW74G5RojEIgg7fcsnhdrlekhwJNyGQJEuKdjMUUN5ugZtVhdcPhwnTqgmYeB7aAOo9pihNAsS9sE3kOWe0Uj_zEJIGCP2Q_5Rg0odO6qliVn4NkLeBLC0sXON9PKfwcRmU6VDNHIVDIwwfS0Bdd5xwIHmp3zdjC-qSY/https%3A%2F%2Ffiles.fm%2Fu%2Fc5c43m25gn
Resource
win11-20240426-en
General
-
Target
https://secure-web.cisco.com/1AmpxiQpBC5N3zGlWtKEfDw6cr7sWLH36JZtg5ir10WgdIon4bP9x44HaRTV8RB7BB2xmhYp17F9IK2JT61KfYBbcEzLvLWOBPusqNdmCz4mn-7hMinpu_CqPS9Q_LoLjRa6Cze1cEdSRFcctYRcA2DHfn440Vhpfg9-HmAkH3r_3IJDP8VdK7bZxGhRNNh4bc0i08yCTq0PAjBpqfnXxbGwQcyZ7FDW0vRcXMWLSarIM6-7Qh51cIj5ZmWn_Q_HEkTxSm_5TW74G5RojEIgg7fcsnhdrlekhwJNyGQJEuKdjMUUN5ugZtVhdcPhwnTqgmYeB7aAOo9pihNAsS9sE3kOWe0Uj_zEJIGCP2Q_5Rg0odO6qliVn4NkLeBLC0sXON9PKfwcRmU6VDNHIVDIwwfS0Bdd5xwIHmp3zdjC-qSY/https%3A%2F%2Ffiles.fm%2Fu%2Fc5c43m25gn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609688572186674" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 5104 3132 chrome.exe 80 PID 3132 wrote to memory of 5104 3132 chrome.exe 80 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 3464 3132 chrome.exe 82 PID 3132 wrote to memory of 4188 3132 chrome.exe 83 PID 3132 wrote to memory of 4188 3132 chrome.exe 83 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84 PID 3132 wrote to memory of 2512 3132 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secure-web.cisco.com/1AmpxiQpBC5N3zGlWtKEfDw6cr7sWLH36JZtg5ir10WgdIon4bP9x44HaRTV8RB7BB2xmhYp17F9IK2JT61KfYBbcEzLvLWOBPusqNdmCz4mn-7hMinpu_CqPS9Q_LoLjRa6Cze1cEdSRFcctYRcA2DHfn440Vhpfg9-HmAkH3r_3IJDP8VdK7bZxGhRNNh4bc0i08yCTq0PAjBpqfnXxbGwQcyZ7FDW0vRcXMWLSarIM6-7Qh51cIj5ZmWn_Q_HEkTxSm_5TW74G5RojEIgg7fcsnhdrlekhwJNyGQJEuKdjMUUN5ugZtVhdcPhwnTqgmYeB7aAOo9pihNAsS9sE3kOWe0Uj_zEJIGCP2Q_5Rg0odO6qliVn4NkLeBLC0sXON9PKfwcRmU6VDNHIVDIwwfS0Bdd5xwIHmp3zdjC-qSY/https%3A%2F%2Ffiles.fm%2Fu%2Fc5c43m25gn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c29eab58,0x7ff9c29eab68,0x7ff9c29eab782⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:22⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4104 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3244 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:82⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1808,i,8664679936174060842,7970256028924084785,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD5014c02355b1cde047f3ca16170028350
SHA1421da65b5e44e42d9d34ed685cd5aa80b8322f91
SHA256af6f92e012cfa8b19e4c0a12c7ae3e080c058d54142279e0edf4f18bea8be9a3
SHA5129f50b3b41bfb16ac971bb181ee3caf0b7974f237d51a8c02520fb29063775f08c1bac6c8740e48430ff4dadc6190729bdaffdd2586e5ac8adb9edf13391f0fc9
-
Filesize
3KB
MD585d853acd932132190602558713de0d4
SHA11678a1f8694dc276fc65e438660b590f2fb51bf9
SHA256c3b44f02c344de2c6ff70c058b66e8873d7fb4730c85b76927d0ed14ac29c851
SHA512da620fe31f9786ec796150e1513aa4ff7a465b15d3955265cd0aeec11eafcceacf07ed5db8eb37c9f62dcc3ec65143ca4aa8723e28879f5537caf2e61ab55fc8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1024B
MD526ec67e212d46719d147f2d37551be33
SHA158196309fca7c19c695af9e95baa0b72a054ab56
SHA25698c9bbb5b61541b28ffd2ad80d4dfdbabe036eb120ba1873346561f58619632e
SHA51265dcad7da89d7d9981360685086b6661080798b7169743d39947f2ca26225d872c823ee8ef34b89373b3bc3ff34f9255d04d833dbe1906930bbbb660ee490f2c
-
Filesize
7KB
MD5d8e3466e29584682a37a065f92bfb6d3
SHA1904872b2ef82d027e93110c97ced90352180946b
SHA2566b5cf2634ec9c80975a83d033ed8c07cabed2d0fa64819fc19b4788d7ec04c53
SHA512a1a2b288a7cbbc327b320b2957c2543ed7be7f17239a1fb2c1df9679f4a1371143b045eb9383e737f1861f2bf71a8526fc5e6d73b10aef17eed868cef52d4057
-
Filesize
130KB
MD5799a7b5ee14dbfce88048a12066551fa
SHA13482c7586b38d8e1f895a79fefde9096c0ecb25c
SHA2569c3cfe3c892b76759fcf87a5a69ecb52950fc246567e0295df735ad038169216
SHA512398cd8171db5ce90af5338e2100d86f7ddf5bede0ce4189fc73df5d4db6cbac9f0fcdcf23c3e48340233c32bcd1abec0d7338e1e2f6294edc7baac7c73e7eed5