Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 01:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://teriwireless-my.sharepoint.com/:b:/p/lorie_spiteri/EbYRJ0nimcJBoERD-RKKjY0BH0VJxhegCkchbh9KDHkPxA?e=cYafDG
Resource
win10v2004-20240508-en
General
-
Target
https://teriwireless-my.sharepoint.com/:b:/p/lorie_spiteri/EbYRJ0nimcJBoERD-RKKjY0BH0VJxhegCkchbh9KDHkPxA?e=cYafDG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626309439743493" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 3140 chrome.exe 3140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 964 2264 chrome.exe 82 PID 2264 wrote to memory of 964 2264 chrome.exe 82 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 2824 2264 chrome.exe 85 PID 2264 wrote to memory of 1256 2264 chrome.exe 86 PID 2264 wrote to memory of 1256 2264 chrome.exe 86 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87 PID 2264 wrote to memory of 4936 2264 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://teriwireless-my.sharepoint.com/:b:/p/lorie_spiteri/EbYRJ0nimcJBoERD-RKKjY0BH0VJxhegCkchbh9KDHkPxA?e=cYafDG1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40a9ab58,0x7ffe40a9ab68,0x7ffe40a9ab782⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:22⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4620 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4156 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3896 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1560 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3896 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2916 --field-trial-handle=1916,i,14599608158066125252,17865220558340857032,131072 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5f12be186e2357c46724b81f7cb2c8a75
SHA11f2465dfe048f45a60347c468a17a8d002b4d425
SHA25658f0bc72ce2c8c3ce4f477bf38046a67bf50a7393e993a5fa681b2776eb548a4
SHA512a73c3c0c5d5d25c59a7d54cc8fb382fdffd0905c97ec6f5f3c0b615327f5bb8a65bcceb351ab5742fbe3e754cb8a55fdc80618801d04783a8a04d21b14bfae7b
-
Filesize
255KB
MD58aec9cf69d7691c29dda6d2c2ff42107
SHA145f0c07bd08f2eeb8ec4e865d10a67e81782712f
SHA2562e5f3a08277ad768e555e3af72634b4511580065e0c58ada0b6544caddcbe84d
SHA512275d598bf9f721e2ce62e62153d772cb4de2d03da5317f0399fd5961824080436fb594b8d50e35c4ba73330ba6a63fbe56c653e09a5657b7e6a1b5aab439be4a