Analysis
-
max time kernel
18s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 21:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://em7719.jones-mgmt.com
Resource
win10v2004-20240709-en
General
-
Target
http://em7719.jones-mgmt.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 3660 3116 chrome.exe 81 PID 3116 wrote to memory of 3660 3116 chrome.exe 81 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4532 3116 chrome.exe 84 PID 3116 wrote to memory of 4376 3116 chrome.exe 85 PID 3116 wrote to memory of 4376 3116 chrome.exe 85 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86 PID 3116 wrote to memory of 4192 3116 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://em7719.jones-mgmt.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb093fcc40,0x7ffb093fcc4c,0x7ffb093fcc582⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2196 /prefetch:32⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3288,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4372,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4788,i,276539637977581411,11682387329319329952,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5b50cfde7a1bf1893064927a30e888263
SHA17d1ef93d8059b8c6a7bd54559ca03ddc419a35a0
SHA25613350fdd11daeaa2eb12751dd202b1f822626a0eead60e1a1251dfafdfa3c4c8
SHA51281c9dfc560cc8c00021438408f2954e0041cee0bf4d6fc2511a5f5f6f275dcec43a469d1d937ed4812ffba174ca08a9c94fa76192b42062ced13b34e4b4d5f4e
-
Filesize
92KB
MD5a10604e0f61b461fbc07acce97d6ad47
SHA1e88f42e33332d98555914524e01ee385497d4e6d
SHA2561c3ce3f389686202ded24b63cf0cd346fbc3b236ff3a90b09961687e71c6a48d
SHA5127176a7c2b0f05b68163e0c27971197238bb172cdac6607c9bfc8898f0d1cdc98082ccd6085c95beb580e36cfb4827a803e1dae332152a974f0e86e96a361b45b