Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20/06/2024, 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.na3.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAATBIUpAt11E-BY1J_esJAt5aiyYjAnxmVt5LXnBvltp_XHSMv0Beh3KmuKfPCpBci7iHlzXNjVO5Bel_nteMOCUpFu8nfyjQAQ1CiSZEEbs4OPWhUPlY3AW2a79YPGBfL&
Resource
win10-20240404-en
General
-
Target
https://secure.na3.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAATBIUpAt11E-BY1J_esJAt5aiyYjAnxmVt5LXnBvltp_XHSMv0Beh3KmuKfPCpBci7iHlzXNjVO5Bel_nteMOCUpFu8nfyjQAQ1CiSZEEbs4OPWhUPlY3AW2a79YPGBfL&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633738977664517" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4236 2196 chrome.exe 74 PID 2196 wrote to memory of 4236 2196 chrome.exe 74 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 168 2196 chrome.exe 76 PID 2196 wrote to memory of 220 2196 chrome.exe 77 PID 2196 wrote to memory of 220 2196 chrome.exe 77 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78 PID 2196 wrote to memory of 216 2196 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secure.na3.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAATBIUpAt11E-BY1J_esJAt5aiyYjAnxmVt5LXnBvltp_XHSMv0Beh3KmuKfPCpBci7iHlzXNjVO5Bel_nteMOCUpFu8nfyjQAQ1CiSZEEbs4OPWhUPlY3AW2a79YPGBfL&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb79e99758,0x7ffb79e99768,0x7ffb79e997782⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:22⤵PID:168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2700 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:82⤵PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1720,i,8750400075549696227,16940166090344921076,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5426848b7f73dec4a49c5a3b02b12041f
SHA1c18bbf1f35786f7ff4afa8142655c79bff28f1a4
SHA25675177a928d91c08e50c6deedf38a505b4270f8b27b259f0838adc7d65e27a337
SHA512fd65ae94e266178e75dd27f4a51f9757bfacb845a1d9f2bf924d1b17faaa16aac69fb74f05e023d807b20fc7a58fcbe0af9969ef0ca0abda7d3229c9b187ee1b
-
Filesize
1KB
MD5a89f01b4792cfdef917b6ebc65c7f061
SHA11228db7695140f5924e8c65ad2ecfdf6c4a1774b
SHA25699f01c8ee81ce714092f215cbc90be642f085cbc7a5fda1447b03e51e64547a0
SHA512b8031a87835250ac5671822ebae187a8d9b572400594db87f3ea7a9c1be21c4bde709f51ead99d73fa5e2e4d6a7596c99332f0034a5a17174741fedb4395243f
-
Filesize
1KB
MD5fbdf2e1088199c508273cd3f72b21501
SHA1732b596476947cc87e8e8e30a96f8b3267121e27
SHA2564a0a988573b653a1bd47b0e7df75138530f50765b01abc7d1b8b6cc93b1591ef
SHA51235e8a3393c20ace1603bceabf6e674ab044a2af107533c7eaa4e5505e070b87be2e4abb7b648135bd5cf95fd3d5fcbc13632fb8d309938de69ded95d8e5b9af9
-
Filesize
6KB
MD5d79604caf22f6900ba14f526b60bd2c7
SHA170a060bd80ad6275b6b1630e2af81534ee43b82a
SHA256483d59656c210b1fc5421f6f471554ff71540bd8da90c22b75421e0b713a6810
SHA51252e8551fb814d16c022dc4f409574d77630bab4f37e05f09614fbb34cc2ca817b745573b160c80d8536348eff3af93f161157d98995bac161a5db8e961a467e7
-
Filesize
6KB
MD5645bcf2b5700e9425be37d970ad9b750
SHA104d70e685b5d041a2b3556e1c1896823f67e6a64
SHA2566e88895a85433ba6abdb8179eeee0d5559594234b0f06ca2c3962c39ae903594
SHA512f75fbfa68b4ca1bef23372e497c5f062b1527760508242a3a2886f51b26dd3d32834971b3e684627cddf75b0b975c4ed6a8341fb4bbfc37e0a1a8a660ae39f2a
-
Filesize
6KB
MD528b7bd6b7aec75ecaffc8ab152faa7ac
SHA1280a677250e6d5a180e957428b2c94b108550457
SHA2567da79129c9cb2a2b46402cddadb78e075785ccdd9aed2fb11e8cffc8596d658a
SHA512c33bb237a83e448e3eb35ab257a6f38fc3523bad80b68e67c98df23900c8c57b1214d6545a9d518f35451a6bc932dc9d4d6ca365229679e91efedc672cae6179
-
Filesize
136KB
MD5126744d8ddad8b440a9ec06832947209
SHA177c7b8070bb6802f86eb80bf4211c86dba65de22
SHA25626befcbb165ababd49b91c191eb284fed9011c51b5ffe096cae4b8367820630e
SHA5129265307baf3895a41ada9b03ebe7066960df97af8135ce3186f267a8a454cd1484ccba0d015340ad1733a11c4c0941b447432f65b6a735b99f091bdfe8851c2e
-
Filesize
136KB
MD54f5f4f0beb5c1875509442c14fefe789
SHA101c6df727e0140f27f748ca3afd557a1b80112e6
SHA2564707fbcc992611b50088fe3b97da40ec6aaada211d370b93cfd8726edcaba1bc
SHA5128839f25317f7b2787d42c95eaafcba3236dcf9bb86937b9753d29575b68f92227330468c3ab3b89fa962cd1bc750b3d15a965309fe06388ad82a075909ad6228
-
Filesize
264KB
MD536e42a1eb8ee3f7958ebef7a6b3acfce
SHA1e9c15df0418ab502dfcb3f90875b9b9ec4dba301
SHA2561bf40aa3a568b115f0f306058bccfda0a3ff22974b7e1744870f9ba7d5218578
SHA5122409722ab2715c4aa5b2de0390b23aa8c86384abe176e77bcd8e570a001d4e27008cb78be9f74b826175203ce749f305e840ab3d700622b849928788b4bcd4f6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd