Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 23:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://edit.news.e.abb.com/api/signalr/connect?culturesWithNewsOnly=true
Resource
win10v2004-20240426-en
General
-
Target
https://edit.news.e.abb.com/api/signalr/connect?culturesWithNewsOnly=true
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133621040887136761" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3484 4460 chrome.exe 82 PID 4460 wrote to memory of 3484 4460 chrome.exe 82 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 1056 4460 chrome.exe 86 PID 4460 wrote to memory of 3788 4460 chrome.exe 87 PID 4460 wrote to memory of 3788 4460 chrome.exe 87 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88 PID 4460 wrote to memory of 4212 4460 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://edit.news.e.abb.com/api/signalr/connect?culturesWithNewsOnly=true1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba79ab58,0x7ffdba79ab68,0x7ffdba79ab782⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:22⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4276 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 --field-trial-handle=1892,i,2960337888982869230,11168655390348265105,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD59469c9bf7a7365e3d3df2ada9632726f
SHA16ce34c8f16ca82fca6b180ef171448ace279b861
SHA256d8a75bbf87eb334d6668bcce5076f2fa07fbb1f2190d9286d2e2154458f90d91
SHA512c3e8666a98e4d475924cfa3b808e66e5f407f419decb378d223fad5874e1d686c70e1645312c28e930d74ce03f403782e8871ec7b10da3dd50a19dabb1d5b1e5
-
Filesize
1KB
MD5af6daf7313d54fff916d18aff25df120
SHA1c5a3891b3e097c0a420f07225693be7fd366269c
SHA256167eef05e48eb315fdc7b0e25078de03ac4edbfe2e589a076fd69cb70bfbaa93
SHA512ea14e7ad5f1565d31613b5c011ecf59412f9d48a5a6cade783d4bb15c33606af47ccfff1c3f78d8f39cf2488ab6948b83b0381ecb5c755e0965da7af695b6a2c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5b7c61dbcb9afe60aee43369793461ff8
SHA1d96666b75ed6171764b9896010387bda405ae1ed
SHA2564183bbffb7916ab7f50d19bc1671376e87c183b8d5f4c03c14446d5ea8230b30
SHA512ce4d8a0ec0c3431ca1e47b07dc5cd5934ce4ed539625945c08f8a402e12163779344a0bdc0d9f6155aa428612ef269a96ec765b30b4c9a7aeb079bc4e95ccf6d
-
Filesize
7KB
MD5a87353f63daeab26e0678e08edc10cde
SHA148c5eccf686cfe4aad49081e2561d6c6918c1a05
SHA2563438fc6cbcdd38bab9abf5daf3a944a34ff6a7e70a994ba163a4ac0905656999
SHA5125ecf6b1f6600d58ce5370e9267d08cb493f11de21e96ccf0887a9e41fea97a36beea44bf90e608ac057fd199605ed42d6f2a4914a1da294633bb774c6084f78b
-
Filesize
130KB
MD5ad68677f888a63b9fd5f0e58ee7d11c0
SHA164a77ba9b419907c7c49dda12f354be406e13c84
SHA2568b622e1a308fd8faf2c6313cf9b8f21138f10043df1a2713de02004c64e062f3
SHA512d07a30f2b3762224d968c16a2a642853b9dacacf205a325775db5af0a8578d4fc911d37385cef58a92d780e592e4c7d3036721c2da3293f99262d19ecdabbf1b