Analysis
-
max time kernel
169s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.smartsheet.com/b/form/55c51e02534447cf93ec1e3d71cc50a6
Resource
win10v2004-20240704-en
General
-
Target
https://app.smartsheet.com/b/form/55c51e02534447cf93ec1e3d71cc50a6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 556 chrome.exe 556 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 556 chrome.exe 556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe Token: SeShutdownPrivilege 556 chrome.exe Token: SeCreatePagefilePrivilege 556 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe 556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 684 556 chrome.exe 84 PID 556 wrote to memory of 684 556 chrome.exe 84 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 524 556 chrome.exe 88 PID 556 wrote to memory of 1656 556 chrome.exe 89 PID 556 wrote to memory of 1656 556 chrome.exe 89 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90 PID 556 wrote to memory of 5088 556 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.smartsheet.com/b/form/55c51e02534447cf93ec1e3d71cc50a61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98702ab58,0x7ff98702ab68,0x7ff98702ab782⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:22⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4668 --field-trial-handle=1920,i,16307091641748074188,10745629043766233620,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD539895f88f53f8ed3b0ac056703d1e02f
SHA1fd1edf9cd881a957527f78bc53b0368a896315dc
SHA2560316fa13dc3e821ea710fbcf84bbd1a82cbf553fd85a81cba47af3f36c17ffed
SHA5128b097294678e3dcc7608595640fdcd8eacc6b0a27619d017f59158b0a66fd8839934b2f92a1fdf55bcac10ba6af1338ed6eef5fc4cf8fd454eccfde0218674ea
-
Filesize
2KB
MD5a09822a7e6152864240c5c0462b9d234
SHA1ad50660d77de3cba2b3cb3f72e4e9fd8c8965aaa
SHA256bb7440507a70087dab7e373c2674b9ce2f0379fce59b288f6d063d2d83765736
SHA512a520c3f2cf0087651e666ebdf43382df9c3b32c94dffd663fe9dc07ef650c3be1ab2441b87ac5b0d6b5ab10897bd92004b3cf34e244ff740fcbfde244da5fe04
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD51fd2a5a263f4471b6ad200e7f5fd42b9
SHA17651f8c0035d8887626ca788ff3a4bea88c656dc
SHA256cd75f292767e95f26a04643348b88e0eadb2c77ab296406d7f8b9a533a82023b
SHA512e11200ea4b04dfa9e18086dbdb4379c85c64f629db2b662185d3edd8d1a9510d154c3fec862a270b1ceca16c8b80831be48b34c4e6b321904d6b6dc9d3b6fd5e
-
Filesize
6KB
MD5ca949e585b34f45db1f2d54f1b78f2f7
SHA16bef5e0c2ef9e396918880b1fe568e3a142ab93e
SHA256d2cd8942d8be9f3029d3e1b8dba94f061ea37866ada767b7bba38e4c4abd3366
SHA512edb4f045a34b421fdba52f5ef50820057177d7b14d23a565b5637acf3373becfe2f51f1b39fdd6ada8ed69be185271ce6e4164c0744c5aacdf734ea0ed0c8bb0
-
Filesize
6KB
MD531a5ad40b34edb60670d44d0674fb077
SHA1ef447546ee1ffe0238453bc9d401038f374459ee
SHA2566ce32dcbd909a686304cf23c2d02597a9055796261256f9c3f2ee36e89b66620
SHA512847954840a0a68734a93f3a4f8a04c24d8f966f34575fab4eb546251528970e6be4a1c6a8f94661c791e2aa96ec69df1066696c39fd01d24268a039301f36933
-
Filesize
6KB
MD59d0d33730d052a7f5f4551f2307162f3
SHA1ecd2d0ff3cd84a0a3d44989bea74772b5172103b
SHA256f1e7bc6cc4e74dbc4aacbb0bc6a92e7387e4b950bebb0d7c77f6944be4088325
SHA5123f5bb763fa5952e7863aed2a6d0f25b9f55b6e2cb762ac09db9c95cdb78b00c6c7c8b1f66dd2da6a9798f669e0b9270c251ecab73b1bdc3dd7053b98beaf5ce0
-
Filesize
144KB
MD5aa1a0a198952989f8702134cb93338b9
SHA1719961f256d9c64869dc7811c4fad3340802e73d
SHA25654fb24d1acf18d880989b52abb5197a5f7ebde56d94f3ce5aed74cbcbcf12852
SHA51228586aeed243db585eaa7a0912f9157e8bcb0e54f198d9566abb5baa778e6187018546d8bfb7cf0d137c60d728a04c02974ac4c7342aeb219d24beeb4edc666c
-
Filesize
89KB
MD53ec25bd22396d0f36ca88f3745b3835a
SHA1dd0985ae40730f31c328d20542291bca6fceff1b
SHA256ebb1fe0aac6c4e5eb46e9b974141f4f7218e653e2ad130f897a76de2cd0d09de
SHA512d044c4a42f471112131206831b85cf057071eb2115075ef1d543e0dbabcebbf26799c4e864c07e2eb1181350225d45a01a05591a62280acb2efde107621dd62f
-
Filesize
88KB
MD55346aed7fbfaa6b553281aa13206fc80
SHA1d3da9ef9a5a49052ef59fcd285f41b5f7a80c585
SHA25625d45e2ebbbc4977f5c64bef2a8a0fb28afe282d494ab8860d2f392bbf1863a6
SHA512526b6369de17d309c2fac49ee7978916a56910f00177d137a9244f8a3f4e73e9eef9bae9775732a5246bf17f76741c034864f2d26e76382b20bc465ae72b99dd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84