Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 16:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cZcs904.na1.hs-sales-engage.com/Ctc/RI+23284/cZcs904/JkM2-6qcW6N1vHY6lZ3mDW7Hd5kT2bpjjcW3Xb_v398WzRVN7sG2wG60VjwW1qjjs833zcPfW92zd0x8WDRWwW9dPGsw5x58nHN98CV-NyJw7CW6Kppm81-DD3LW73cc725KT8jsW70jFlS3ZJFhRW34mLSD9g4kxMW5q-3xY1bD7FMV2nG5x9dhFyMW12Lppm2g6_WDW1Mg0-98V3RLDW2G69n76KTQpzW8JWCvt2RcHKJW3DswFL1kfrWhN8XlM01XxtFyMJjm1lXBX1JW967g0S4k-DshW2wh6kY7bv43gf1BJ_zW04
Resource
win10v2004-20240611-en
General
-
Target
https://cZcs904.na1.hs-sales-engage.com/Ctc/RI+23284/cZcs904/JkM2-6qcW6N1vHY6lZ3mDW7Hd5kT2bpjjcW3Xb_v398WzRVN7sG2wG60VjwW1qjjs833zcPfW92zd0x8WDRWwW9dPGsw5x58nHN98CV-NyJw7CW6Kppm81-DD3LW73cc725KT8jsW70jFlS3ZJFhRW34mLSD9g4kxMW5q-3xY1bD7FMV2nG5x9dhFyMW12Lppm2g6_WDW1Mg0-98V3RLDW2G69n76KTQpzW8JWCvt2RcHKJW3DswFL1kfrWhN8XlM01XxtFyMJjm1lXBX1JW967g0S4k-DshW2wh6kY7bv43gf1BJ_zW04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133644961003314787" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 752 chrome.exe 752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 752 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeCreatePagefilePrivilege 752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 1928 752 chrome.exe 90 PID 752 wrote to memory of 1928 752 chrome.exe 90 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 1740 752 chrome.exe 91 PID 752 wrote to memory of 4444 752 chrome.exe 92 PID 752 wrote to memory of 4444 752 chrome.exe 92 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93 PID 752 wrote to memory of 1516 752 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cZcs904.na1.hs-sales-engage.com/Ctc/RI+23284/cZcs904/JkM2-6qcW6N1vHY6lZ3mDW7Hd5kT2bpjjcW3Xb_v398WzRVN7sG2wG60VjwW1qjjs833zcPfW92zd0x8WDRWwW9dPGsw5x58nHN98CV-NyJw7CW6Kppm81-DD3LW73cc725KT8jsW70jFlS3ZJFhRW34mLSD9g4kxMW5q-3xY1bD7FMV2nG5x9dhFyMW12Lppm2g6_WDW1Mg0-98V3RLDW2G69n76KTQpzW8JWCvt2RcHKJW3DswFL1kfrWhN8XlM01XxtFyMJjm1lXBX1JW967g0S4k-DshW2wh6kY7bv43gf1BJ_zW041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80e90ab58,0x7ff80e90ab68,0x7ff80e90ab782⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:22⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:82⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 --field-trial-handle=1784,i,4237870876537840463,1544777369078063077,131072 /prefetch:82⤵PID:5180
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1300,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:81⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD582f2498074311899e4a237146e414324
SHA16771e0ecfe8fad62dc2a5c933eaac76931d7db59
SHA256c343ee6a2a624306e77af1c309fecb401311e687727514e258bd63ac4ac5300d
SHA51275e6da9dcbdd5779187a35e5b4da5e3858bdb0a3f8bec71e2ec11227c8da4c9273785035afda378084951686cbf81950310fe19b0f3d41d94e98f9dcedb1235a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5950eaa48e4209de8b9545830dba1dcd9
SHA1785373a3cad5bd5f692253b0c95e1ff1cdcf8fbb
SHA2565ae704750c1115d34a464b0debe04471dedc39e0806b2ee10fe4a62f8701dd32
SHA5127234abb2e280fd74de9144313749db83019cbc449b094a67d3cf8ef5914f1a0fab7f1da736c8fce5107fc82bc25f6e615d86266824887e778a6f5ab434f060cc
-
Filesize
7KB
MD5fb7aabe1cccc99ce88d9fd20c39f6e65
SHA10652cd9e269c1e32391550b3496b7b45cf30f6f7
SHA25690e1da805cb6378f054d13cd176874d2765a85af15d01226aac60eaef8881224
SHA512e625edef33f9f3b1a7ac15a49fa8d42462236ca5781057928e2d1594234af302f64c71ca93fa3029990125fd9ee94af70ddc03c8606721f772bd8127150b47b9
-
Filesize
138KB
MD5a912ca6537a157bcbda8cde742979a82
SHA1d2d32bd5a5dfc41aab6b84da532580c9212adf35
SHA256edb732546564100fd9b40b47f28e31939595e7a58489e97e34ff74316ea34500
SHA51275bb51f4245a1a6f70414b91ed8332e72e8cd6b904a51b5117361699daca75a5f7c56d0bb14f7576f49f46afeef4fdc7c0e314a7a115a4fc156d1a9b7b9582b3