Analysis
-
max time kernel
300s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 13:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://redirect.viglink.com?u=https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F3c36d3ab3fd24468817b0ac443a03b45&key=a7e37b5f6ff1de9cb410158b1013e54a&prodOvrd=RAC&opt=false
Resource
win10v2004-20240426-en
General
-
Target
https://redirect.viglink.com?u=https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F3c36d3ab3fd24468817b0ac443a03b45&key=a7e37b5f6ff1de9cb410158b1013e54a&prodOvrd=RAC&opt=false
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618948901423905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1880 1800 chrome.exe 81 PID 1800 wrote to memory of 1880 1800 chrome.exe 81 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 2460 1800 chrome.exe 82 PID 1800 wrote to memory of 1320 1800 chrome.exe 83 PID 1800 wrote to memory of 1320 1800 chrome.exe 83 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84 PID 1800 wrote to memory of 776 1800 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://redirect.viglink.com?u=https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F3c36d3ab3fd24468817b0ac443a03b45&key=a7e37b5f6ff1de9cb410158b1013e54a&prodOvrd=RAC&opt=false1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc03ab58,0x7ffcfc03ab68,0x7ffcfc03ab782⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:22⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:12⤵PID:324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5e54073b3f431a886d2c71f1d5f966d71
SHA11643c0dd3df16f485f3022efb3871a7321d7b75f
SHA256775ec7c096b01d5cccb87dae029136b070eff3fee44d3e4fd97b885ca3c4e8c4
SHA512b5b29332261bf66a68642c54ea3dabfee778141b976ecb81102044a9bb46a034d67d7e176795e7eb2699e5a93b4bd4d351788b6166ee4b6850ef4041995d5a84
-
Filesize
1KB
MD5b47fad696704e132418dd9dcb141cf9c
SHA159b938278466f3b87945de9875dc4765d507319d
SHA25691549d7d4ecc5c733fb3e6cf41b8c26cec345510995df8aebacf060bf6eb5448
SHA51259830aff157315addc1f240bf3672e34fbd46ecd342ca627e65b72dfb0074b5e751be6cb116c2465b926a5ce2ec07c77a2ecedc921a75d3a5d748941835fcd2b
-
Filesize
1KB
MD55c0754bb22b54734d8399fb81ef6a578
SHA18adc07967e8c99913953ee1272828c9d160a1679
SHA256fc6db88f57ef98a912667b2bf3ccf301273dc8bd5bfe9b094e8895f3355ec311
SHA5122bc4b5abc7f788cfc08dd054e29d834ca1918f2a241a224c8907a9a246505a733b8a22cd71a2e44255b1885bb5469d280fb11e5748cb0ed8dc92cd577b0e2886
-
Filesize
856B
MD5a0b5a4fc9a80e4a3b89c7848ea09cc63
SHA1dbf7c3bdfa3a0bda6c730712f9bd08466df1a5a3
SHA25624693df272a25ce451e398100603db66abe7cc37990117740b57d842cc96a121
SHA512b0fad1b7eb787cc2b7811113ff6de2f8662b1b43d061973551d3c8bb3c75552e8dd49ac1944e4f09cc5a24e9ee1b564cd3bbf85e75480772d3aa2f5d048ccf56
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\d130602a-b83b-44d8-8322-cd29c2ff0a33.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5056942c5fd84b56a44d491fea6d6b6e7
SHA195bf7258e4795c756ccb3ad2a12642341b4574a7
SHA2564949bfdbdce434215c2d6575e421ae96b430a1f16a9f475b820c90b1b82361f3
SHA5122fe77de670b8fe8cf9fecffcb96e6616e7219e514955ea7fc2f525352b499ebd4850150361dfd56db03b671d44c0c4024dda3d8930f527a5ba79766552e19087
-
Filesize
7KB
MD55a0ae443c499635f3b97b127a6a46fb4
SHA17965b37e1baf9e6528bf6ee1ae2a98db9f9b8042
SHA25675a915c487d97b5fdabda3e188f59089a96be1b912679a36383242577db9dcde
SHA5128ea2a1d4423f2236cb46d98d62fd7434d696e08d62de24441c1c80458be87f1cbaa303092a82f92baf01b53a6e936226be549cfd6f28dac2e5297dafdef2cf48
-
Filesize
7KB
MD545a13077935be7977211fa9a01008818
SHA1b09a46eab75557f42badc85feaf4ce35ceb4aa2f
SHA2569eee3c4c4c6d60bb76b4812d87427d13f110fc9cf4f8a453704d64d42b59ffea
SHA51243088505a2bc8cbd156516af567214d870c2f5c2d8352549f26f71fe5af827a058efa90daeece34e9d6882f92abe3a9b1ba431cf4c7e0299ea6c48a0fc7f4913
-
Filesize
130KB
MD5f3874a340a59d2e1ad891a2aa99cf86c
SHA1a915930b997c2a5eef84eb3e6f3da426a274a1c8
SHA256332ada1a774d0e408cccd9dab3bca852977c73c1dc557e08981dcba9631f4a5b
SHA51261a2696f4b954ca0dd057e649f715ffffbc1c912fff4109b2d93f68d63246393be2359b97d5a2e94c2b65ea07530d72779af285784f1ecfa12dc570fc4876bee