Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 03:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://frenchsshoesandboots-my.sharepoint.com/:b:/g/personal/tsanders_frenchsllc_com/EXbVxo_dRg9OkX0KtVZ478ABWvexOoAcpPUd42lvJxoulw?e=4%3arzz56D&at=9>
Resource
win10v2004-20240426-en
General
-
Target
https://frenchsshoesandboots-my.sharepoint.com/:b:/g/personal/tsanders_frenchsllc_com/EXbVxo_dRg9OkX0KtVZ478ABWvexOoAcpPUd42lvJxoulw?e=4%3arzz56D&at=9>
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619470898307463" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 4920 1908 chrome.exe 85 PID 1908 wrote to memory of 4920 1908 chrome.exe 85 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 2172 1908 chrome.exe 88 PID 1908 wrote to memory of 4848 1908 chrome.exe 89 PID 1908 wrote to memory of 4848 1908 chrome.exe 89 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90 PID 1908 wrote to memory of 4812 1908 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://frenchsshoesandboots-my.sharepoint.com/:b:/g/personal/tsanders_frenchsllc_com/EXbVxo_dRg9OkX0KtVZ478ABWvexOoAcpPUd42lvJxoulw?e=4%3arzz56D&at=9>1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb323fab58,0x7ffb323fab68,0x7ffb323fab782⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1912,i,9166212989520337782,2597177768025259172,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD58ce7876a34622bf579f06b831ae63ca9
SHA1458af2cb4368ec115c9332ec81fc092eebc72774
SHA25698c93a43ca95a647b830ddf988f74dfe28c7ed7e330c8f2d44b309e4af9000d7
SHA51235b10a2079e8ebf4a010fcaa28cb223d6a4ab83ef5b0f6b349f053e34aaeb7af85602a60f7a894a93db63a36046bdc6fa66e82e030b911985674b3fdcc264d40
-
Filesize
7KB
MD5f49dd8f9ba61356b463c9ceb9eebc873
SHA1ac66abf9a7172a0a54f62d5ee300cfe96b992b74
SHA256a90f60d71b720c7d10d28e30bf63e282a2d3d3678691d032d335086ceed26cd3
SHA512b04b2b8277ad621af51d88f286f8b9042f783b9a2fc849a51f4aade3e41e7f828ce3e84484af805a9f1db1e695055ea1aea0b48d68dcf79fb76a256284e63fa2
-
Filesize
130KB
MD5f298c6931c0ef2db145055fd6e90aafb
SHA1a76a9aa03481f3237a5767eed204b3776f7c4dbf
SHA256b7e728727265489a85c883148e90427795212228d28fe9c816e9540ef410cb50
SHA512b81c5c0da50e895ee375fbde64849ed91e3fcd50e7c6d97fe9ed3dcbd2b3356b3af5ff3ca5221e1eda34f05e3dc8053543e9b1dfbe8488a27e3deddd2285f27f