Resubmissions
14-06-2024 19:26
240614-x5gzyasgqh 1Analysis
-
max time kernel
35s -
max time network
27s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-06-2024 19:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cognitoforms.com/Fgliuxyjthcgvhxuy/CIityOfOlympia
Resource
win11-20240611-en
General
-
Target
https://www.cognitoforms.com/Fgliuxyjthcgvhxuy/CIityOfOlympia
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628667728391458" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4792 4668 chrome.exe 79 PID 4668 wrote to memory of 4792 4668 chrome.exe 79 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 2696 4668 chrome.exe 81 PID 4668 wrote to memory of 4504 4668 chrome.exe 82 PID 4668 wrote to memory of 4504 4668 chrome.exe 82 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83 PID 4668 wrote to memory of 1596 4668 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.cognitoforms.com/Fgliuxyjthcgvhxuy/CIityOfOlympia1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66adab58,0x7fff66adab68,0x7fff66adab782⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:22⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2108 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1772,i,13707483782384730551,18239931017609304468,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568064505a7750c918f93d78dacd291c7
SHA1c4d935864d80c008fa1ed7a9332dd9882d9bb21a
SHA25662af97d773ffce19437d18aa5f17c669a5cbfa25da2a4282394756a5309dc310
SHA5124c246c99f65e52dfb59a2031ec2000e9d6b5fdbae549a2c4d1434ba22d1a2e8f610591eda910383aa0509877827edccaa2b905b4eee7d9da51c3944ba5a81cc5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
687B
MD5064959c7119ea17c07b78bab5517eac8
SHA1624b7654ecf1027f24affbf8399047ddba7c50a1
SHA256224e9c0b0bfe47ff94469605dec6fca3f041bd7114bc585d20f8323c9da03127
SHA512adc165f24b498cd8ba603829f09d8b68bf11804a582df53d188fa543208649b3929e736925bc42543f5f21dd6d49e2d6925c1d824e96224aa701dc83d1344911
-
Filesize
852B
MD56937b9c93413fbccf396bf6986b58529
SHA1276269a2ef58465b527ace121c49e399861b952b
SHA2568f3297f8573a103f62af626cf645be726fb93f84a18f605aa6a9c2916b640abc
SHA512d1285729dab1f162ebbe7c11c7b2a58f18013ce62c4d767986c709e0a48e9b53d2a1e1b34d0e10935f0eb0d7fb434647cec21be1afeb95a7f979328590434122
-
Filesize
521B
MD5e3d50a5849f125c60cdadc6c9347fe36
SHA1bec5858a23b06f4a084991d092fa0333c1c9d067
SHA256363eba124413a2ad549f10ac7937ec8af85562a5937d2bfa01eab81744306329
SHA5125a8a1586171fff798808cd2a81e6b86249df29c07af9448c8d7bb599b84d9bc5e0c67cfce503d24287eff0b7e439058627d582b02cd3b59062affa915314f11d
-
Filesize
7KB
MD54493d21f5ee582131a10ecc4b50c817b
SHA1a810402990244c46caabfc8111e9aa88737d5fc3
SHA2564d94ada672ed52d67641a5f84754242b17dc1f1be8896ff25de008773378c81e
SHA5128742d41e8b2b0e8e347657a07aea9f9bb4d740384c19162d141914fc13b77650ae3013ed6768ca185bc020e627e1e6bb10d8e6394e4f2be4f0b73b868c7c411b
-
Filesize
7KB
MD5935c43b5d5cf83983f35689086e49374
SHA157b3c85e07b111c1294d6e2d937bb80e8c248633
SHA256289f2926764f51d8240446b2fb2feba71264868aba96e5f3c81388988d68cc2e
SHA5125796abcdadc9bb20e27f1045aea146f4efc70e6d39c80f88d91dd8d7298c7a5154df7c66719f5c52eda80949e8b235a468e8ad1a9e67033a3abf915c7b89e240
-
Filesize
140KB
MD50811d270b658a7dd3eab3fe24b0d7fe3
SHA1f1d964012885043bf14a4a911abe3325cef098f0
SHA256f6feaa55abd3fbb65ea8d8859fe6e421b9ec745ed208f6954fc9249e31398787
SHA512acb9d6869b529d1399c17dd66b9855a3a2adcf68f7280a0cbf26dcc00911a16a0c0c75b2cc238b3d0436fdc7ef16058e531e4268c55b444bdcf14fad2c55a618
-
Filesize
140KB
MD53b4f4dd1b6ed8095eb4b332cbdd78941
SHA1890892ad90d489b14708d273bd4c2b2dd906e512
SHA2563c63f47a98353c39df31210cce9cf86ab2a59fbdb3d70823b99aaea5e9566e22
SHA51216302272d63f3ecdea331f691fb6ec9b516810812b231848c5be1c68a726606042d35bdfe77baad04c5b135cfeb60f06336d05a9904a4caa7a8171b58b128f47