Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 07:50
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.abad-ca.com/web/webmail3#[email protected]
Resource
win10v2004-20240611-en
General
-
Target
https://email.abad-ca.com/web/webmail3#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642938831364134" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4704 chrome.exe 4704 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4704 chrome.exe 4704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4704 wrote to memory of 1200 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 1200 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4616 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 3940 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 3940 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe PID 4704 wrote to memory of 4916 4704 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://email.abad-ca.com/web/webmail3#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7066ab58,0x7ffe7066ab68,0x7ffe7066ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1912,i,7672058589166220802,13783183121590068580,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a9a44faa-be84-4561-8d8a-afc1d1ec1716.tmpFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD538e009e2753a66f27de1d97f8404da12
SHA1b1f6603612303b39cc23f41cf22bb5a9f858ae2d
SHA2564d5d06fb16d1e5c4399638832f16df4141f889075078fec372ebf974e6aede4c
SHA51246c4c0873b262140bb4138a9885ba0d74aa1ac6b40b2f4618098756b770d3fea735e540b9432a65c9b75e13afae6f45fd1f0be8838f0e76aebe49d7bb8ebd984
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5a48b725a5ac3ed03320e09a075f6d834
SHA1b92e2485e08e0c3a39f78c0fb20f25bf7fb1288f
SHA2566f843278816a163cf768a77fafb9dc1a72fd27885815df6de6d2cd98dac01d6d
SHA512dc87e0a45657bcf265c0f8774be6d1d5901ecc33797dc8ccfe7ee124b3246537ffc917f47f4b26ad67fffcb7531d78c8532694357e5d3ee3e22e9d93d661b6fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5777edc686c135f4f4463c26c84eee7e7
SHA17992a2409408c5e39beb0a4dd6f4c4fb97473fad
SHA25676637265fb80a0e6bffb764c78dacc0a87c87ef25d9a7bb3be54de052dad81fb
SHA51274b40d52d12b0328ac0a1535b64167f43488acf1e3a2d406a755a74bbac7777fe4b304dcb36d7269416dd952fed8be0cc60c7a36df806289f19fd34d793d9700
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
138KB
MD5f0629d289f9d1ad7f161c833cc4071e0
SHA1ceab6b4a854e25ec00611e185521c611f0d7a298
SHA256e836703e0aa4d0edfe496d617326ff72496c5a1117b33e19b8a85c4fff719c0f
SHA512df7848fc040b48c7a33691adf3290230f6daccb018180854eafe07fd2fa7f31d52cabae5abc098bddb619b594dc7f0dde1eccf021a540336c71c6cdfb57d8570
-
\??\pipe\crashpad_4704_HDIMDDWXWDGKTAMPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e