Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 07:42
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sc.medmailvault.com/enduser/def/en/login.html#%7CCScarpino%40evolenthealth.com
Resource
win10v2004-20240508-en
General
-
Target
https://sc.medmailvault.com/enduser/def/en/login.html#%7CCScarpino%40evolenthealth.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642933429743332" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4480 1644 chrome.exe 80 PID 1644 wrote to memory of 4480 1644 chrome.exe 80 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 4568 1644 chrome.exe 81 PID 1644 wrote to memory of 3624 1644 chrome.exe 82 PID 1644 wrote to memory of 3624 1644 chrome.exe 82 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83 PID 1644 wrote to memory of 3476 1644 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sc.medmailvault.com/enduser/def/en/login.html#%7CCScarpino%40evolenthealth.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab782⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:22⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4564 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3860 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4108 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1552 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4536 --field-trial-handle=1912,i,4007945817551286534,10250216351031215373,131072 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD50d262cc036c20478557deef4cb19a65c
SHA153b77a7319be78b10271eb83282ff3397e935d89
SHA25638b9c8b80b8a17ab2685e5d85cc8adccdb844bd7d5ac2f803f67e9126bd92df8
SHA51272d2fbbb0731b3f439e2acf8fa8cca451fdb985d0cd39f210a00636e4919acbb5c9f66453af33e842dccd531f3c0cd3b77d110d39bdbb7fbb32da73f6e508a14
-
Filesize
257KB
MD590fe04747884a52c42d5555ae2efddb4
SHA19d7676bb14df50265c4207b89c0d5c815df0e53c
SHA256f74e16a920937645025d5bc3a275618b7548f154647187ace0d52d0e6b00d3f2
SHA51257bd9d05e74fa90b783367ef7e3477f9326e814dd2c82482d4418ebc092bf0bb775940b69d18ae049c164a5009d3d1084557a370cdc3ffa47969f230d9d308f6
-
Filesize
257KB
MD52b55bb9dd561223408eee94665484836
SHA160c44cd1a6cfe4285c49a5d056bd44d7444d76d4
SHA2562bf02093e4fcb1a1c2c687ed900dfd56e76433ac9b430d22089f934c1dd6af70
SHA512fd1cf3f078f5d6cb2c6299b2b18b2dddfbdc5700d365e8e97b24e2b304affc5f44b1b01b5d90939d36c06709247e690e3d511c2d99dc505ff89d9eef309cb4e3
-
Filesize
91KB
MD5f59a82bf74dde810ac7cc0c5751c9f97
SHA190e21fb1146b5d8ecd90c0abe0b1ac17b431d50e
SHA256591614a56e5ce64ae5ff5eaa068ec0952a4c96f12209b49d4af8aa0fde504502
SHA5120e66e5bfbfadda8e30debab8045d72e59005e3e34d9d6580806cfb9e4284428854dd9521cd77f7fd5bf419cd890ba3fd7c515cba4e8059a6416605cf938ecc61
-
Filesize
88KB
MD593a6bbf50811437ce50431575e3f2fc7
SHA11ebb99347e60802c5fb5755ab8edeed4b018614e
SHA256f4066ccdb7f976c22a648e6f54fc7fd0c75ee9aa1d488886f925526ca49380f0
SHA512cf8077a251b24e22dcd064e0ceba719818fdec05574fc77f3193dcc1ca2b825f7ee2fe5b2c4041be4f3e18b4fc4873b680e78ee7921745aa8a71159db34496b6