Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 20:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://indd.adobe.com/view/2a23466e-c9ae-442c-b0e3-803fa4ad3427
Resource
win10v2004-20240611-en
General
-
Target
https://indd.adobe.com/view/2a23466e-c9ae-442c-b0e3-803fa4ad3427
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638201048631556" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: 33 3468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3468 AUDIODG.EXE Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3532 4028 chrome.exe 82 PID 4028 wrote to memory of 3532 4028 chrome.exe 82 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 2024 4028 chrome.exe 83 PID 4028 wrote to memory of 3172 4028 chrome.exe 84 PID 4028 wrote to memory of 3172 4028 chrome.exe 84 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85 PID 4028 wrote to memory of 924 4028 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://indd.adobe.com/view/2a23466e-c9ae-442c-b0e3-803fa4ad34271⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08ddab58,0x7ffd08ddab68,0x7ffd08ddab782⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:22⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4324 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1972,i,4377025065010861676,15783495455344315859,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2348
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x468 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5ea23fe39cbb5c274d0749df6f731846f
SHA1355d92de7d4ef27a1f23dc263a3330ef0032a76b
SHA2560f51e2fc06714350500af654e59a88cffa29b0f08811c868533a4550b5ded989
SHA512dd1258cd533a814db2cd4733597ca68919ae4cde3b682d92165ab9f2dd59b7e7b1470ea66c121b1674f532f1c11fee484bda900e7b3d95682fc9a10154200422
-
Filesize
1KB
MD547ab813145625a1806006c2a933fb30c
SHA1b4d9d8b05a7f2026a1d9fbb44fea055904da9be1
SHA256bc09182b0e6c5616d8be32b7e212bb3f2b655acf53fe4a5fc7748af4739985ca
SHA512785c23f7b68777dfe2e116368cab85bccd096ed10d0ece92497b8df93535482317fb09221c2b3b710b63698e979fa647b48d46190413455d869e91d7e9124779
-
Filesize
2KB
MD534e905d96e60ecd3d9086ae9c65899b6
SHA1299b878a06f3c5b1ef7cc515593daa95e2652d9c
SHA256ce71fe51d79778a5e1e257e2f9ec00d9af93bd99460cab311c84196b0124cfd8
SHA5125e7eb9f0458b8263e08c203b064181aee28132bf55492e3b516babc04dfadb5278b33a48cfe97795bd0eb8a3ab5e9114a37122a3c18ea37bbe96c980c67ed85f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD574bf6e2a99ce921daa1a498145eb672b
SHA149991a2db9a6a190d301c53a35dd7528c2e5c1ca
SHA256d0dfef582282ef88b14b788b5d23cc8510966ac5ab4303cd22faee8a9fb9fa9e
SHA5128ad140ee6ec67322821072f96c16b5c567f580dff2ee88e804236bc74eb463ff02788e90601c9fa2f8138b9e81e7e019ffb97bec45ccd413ad0e5ad8d995e1ee
-
Filesize
1KB
MD510105865ffdf59376b2fbe84525347af
SHA174d992abc6ce12147948718f55c5c3292edc9b45
SHA2565b70331e37a4b373bbd388f419cc1c81cc4451ce3a24ef5d8492f78b98a7f2a2
SHA512cf4985ec5d5608565ed34ad089f493005fb254bb3310cea62b15d981f6a7ffe985aea5e400387d19d185e718a59ee270d768a17a4bea0d7ec5959fec61a7cedb
-
Filesize
1KB
MD507b7be1951c266c5f46bf91abd505926
SHA154950045aa54a8be4b9eacfe0c71158b7e084c46
SHA256e4e071ff0e065652675be1441031fbfd701243bde09c4f8883db2fd2d15200f9
SHA512677c1e1b48973511c3db8faed3b53be0d0279986b14179f7164be62cab7155fb76acb206f833bb28055362b5378dce7c46e11452ad75c73fd27c384c4847209e
-
Filesize
7KB
MD53f221453e816d80f714ac4475879485a
SHA1bdfb0a5dba27cec8dc74cf10adca28c2390054c4
SHA2567fd035d83eb8fb9b62dbd3f99b23a5a59a90abb7e8ea30f7d47c4487fd116cab
SHA512946e85ff37b90d7353c411a910d41c45e7dc7189a4a9f5cf23bd1d77b1bab054c52862790685ff100266720a9c9cf6ad8b64aa99e4b961e9b3402c5219efb303
-
Filesize
7KB
MD53bba9b4a1f673c072290aa7b7c9e9d2d
SHA1fee8710f01d80b59013f172207d934847fd885f3
SHA256e3e02e403b79d801d3bc3ec974d2e19018842f1eb3a1a968ba212a30d887972e
SHA512ab35f196c4dc20d944b27b844dfc327ab7675f2444c547ddddea257c7e2087db1f68e8fcdea7e501d0830bb9683e68a2b90e48f85f17449ee3553ce34535ab8b
-
Filesize
138KB
MD5047dcea4af4920db652028f659036d6e
SHA1196bf3ed1a279b36e971d55af13260ee3cd65175
SHA256efa2194a436a88ebf101a21fd6e7e3c2d63cea03b6d044370939de072262d2b7
SHA5124585e60a08eeccfd1a94a94155ef194de7007aff6bcbba58da169da614199d6e315edd885dc87fe2d150031702e2a53cd5136366db6d8df46fa3b563fd167f98