Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/06/2024, 18:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.jotform.com/uploads/Justin_Hanlin/220794127326052/5932482772021644868/Loan%20Documents%20-%20Signed.pdf
Resource
win10-20240404-en
General
-
Target
https://www.jotform.com/uploads/Justin_Hanlin/220794127326052/5932482772021644868/Loan%20Documents%20-%20Signed.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620009166529986" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 2460 3368 chrome.exe 72 PID 3368 wrote to memory of 2460 3368 chrome.exe 72 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 360 3368 chrome.exe 74 PID 3368 wrote to memory of 2884 3368 chrome.exe 75 PID 3368 wrote to memory of 2884 3368 chrome.exe 75 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76 PID 3368 wrote to memory of 4184 3368 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.jotform.com/uploads/Justin_Hanlin/220794127326052/5932482772021644868/Loan%20Documents%20-%20Signed.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb27329758,0x7ffb27329768,0x7ffb273297782⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:22⤵PID:360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:12⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1756,i,2301339802276713707,15273811490423380361,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
869B
MD59f199e85d1742baeb3db52ad89b98e12
SHA14c5468241582d7ae78848547234c2cb08899f8e5
SHA25688bb6f2ec3a62bf1010af8adb230b11c116d3a0be94ef2fb03e07faf83060caf
SHA5121eba0b9a63c7fd67161f8d2d96ebcb81fc9587608e57147523c906b03161945d4baa47190195face26af6da50ff83993eb40ac08dfedc2b3ef83202353c2efab
-
Filesize
6KB
MD5e68e95427abc1635c52112a2d7774fa9
SHA1bc722eb8d30e36bcea82e002e12dcf1e471b2a47
SHA256f065400d96555bd037f7b6c2f43e6d7f25f62af5581605b7652ef41b97d51e63
SHA512d02da77926ba0155be57a21166e356414b4f951e1ddc329f96d60082386c242cf5e13ef90162f3c21f6d5a358fb03cd8478238ad0ec97bdc8cfb909b4258bb30
-
Filesize
136KB
MD583a6bcbe3fc12de7b749c31884b0493a
SHA1a2edfbbbc4d9f828009a5e6ceb4b608096c11dd3
SHA2568b9925f7e3e54c319afefd3c26c59aac0fdb435829f1b1dff1c89721aae6aabc
SHA5122722b540099950046dd0d1e7abe8557032573148960311ae77752f5d83b158596e6ebdaec2f662e13b59c04d10e9126ff13dbdfd91b812b1c8638500c3219ce0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd