Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fwtrack.ehrcircular.com/v1/clk/l8hhY5bpSeaAdrOi836xZg,b-fC-lhZT4aT_twwTM1XTQ,0,aHR0cHM6Ly9ocmZpbGVzaGFyZS53dWZvby5jb20vZm9ybXMvY29ycG9yYXRlLWhhbmRib29rLWVhY2tub3dsZWRnbWVudC8,1,N18xXzczMDgxODM2MDA4MzUxOTI5MA,dXYx,U0lHMQ,MTAwMQ,QJNSpsrJ6uPXKuIL8Sc3RarZmyL3hYk7e-wQPJbfe8w
Resource
win10v2004-20240709-en
General
-
Target
https://fwtrack.ehrcircular.com/v1/clk/l8hhY5bpSeaAdrOi836xZg,b-fC-lhZT4aT_twwTM1XTQ,0,aHR0cHM6Ly9ocmZpbGVzaGFyZS53dWZvby5jb20vZm9ybXMvY29ycG9yYXRlLWhhbmRib29rLWVhY2tub3dsZWRnbWVudC8,1,N18xXzczMDgxODM2MDA4MzUxOTI5MA,dXYx,U0lHMQ,MTAwMQ,QJNSpsrJ6uPXKuIL8Sc3RarZmyL3hYk7e-wQPJbfe8w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652007578139510" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3680 4520 chrome.exe 83 PID 4520 wrote to memory of 3680 4520 chrome.exe 83 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3132 4520 chrome.exe 85 PID 4520 wrote to memory of 3396 4520 chrome.exe 86 PID 4520 wrote to memory of 3396 4520 chrome.exe 86 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87 PID 4520 wrote to memory of 1364 4520 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fwtrack.ehrcircular.com/v1/clk/l8hhY5bpSeaAdrOi836xZg,b-fC-lhZT4aT_twwTM1XTQ,0,aHR0cHM6Ly9ocmZpbGVzaGFyZS53dWZvby5jb20vZm9ybXMvY29ycG9yYXRlLWhhbmRib29rLWVhY2tub3dsZWRnbWVudC8,1,N18xXzczMDgxODM2MDA4MzUxOTI5MA,dXYx,U0lHMQ,MTAwMQ,QJNSpsrJ6uPXKuIL8Sc3RarZmyL3hYk7e-wQPJbfe8w1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa1d18cc40,0x7ffa1d18cc4c,0x7ffa1d18cc582⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1976 /prefetch:32⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4632,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4652,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4816,i,9233774409454629531,12464430418028594299,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD55a641d4af4cd4ebc751c4d0ff5390451
SHA10b6d6c07151f9e93e107d97173ea5de6d21c6ff3
SHA2560e16584de89206c4e127988def8ea28d70bb0ef2dc8c914a2d8dc65a83fd2115
SHA5124a0c770313c8206e9c878c24e7462cd5ea7af76d418261b503abc576378f59a6963a90a588e0f7ed2aaafbb14daf2d6316b5148998d2fa84c1ac4f58189205fa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD5c26a3580c740b285e6e0578bb3d03697
SHA1c810fff8548cad0bc732ad4b2f5c7868ea724791
SHA2567d952b5ca8fc064af64a1f3262413f23f12589535eeb49a232f94db20aa301ad
SHA5121f23d1e488878f2c504f65bf853389a1f1267fc86b03d1094b9df3b7629126c7bfb19862acf790a9063184cd953cb5a3636a5aa5a80a2daf2900290ebee5ce86
-
Filesize
690B
MD54c13aa0de2a4c2d7e271d2ebf5d65650
SHA15cbc85a96d2942329e30a5768749b1af0412a3a3
SHA256264df0d3836e9cebb90c4d3b3ae5573208a9457d267575b6f7d28a74229e9986
SHA51215ff29736c7beef72f2c6519d1f0bb89ca3921c5ba43de0873213d0711feab2a22d5dd4790d021de2cbd4633fc9635da5362b27058ff266dc0d20fc4195033b8
-
Filesize
8KB
MD563621be2b0e6c2ac25257226240f1a82
SHA1f6e68ce00ec096b7b14c03fe716c9ab234b30eb6
SHA256499c5cbfb4453b58839bcc4b19853084d0835bca1a805a0649c3b05757665aa7
SHA5125ef3a844c32e6dc15b17239362cf80a237dd629a6e74c32a8981f228f4139c015434d79240ecb54eacb9e76c022c63b4159eec8d709e3b4723a1d656aff2f66a
-
Filesize
8KB
MD58841d7105fffa8dc2c588406465f5c37
SHA10d4fb1df32d831b4fc764f82052e703d8a91b66a
SHA2565ce9f4c42d93430ecc35a167b3ed1251e4120f859e9126a2e5b29661745db6a9
SHA51286a6b108855ceaa16fd1abd86d54bc7231b83dfe5346735729f87ee1e12e86107f701da3334b0a7e95697ef48279280ab8dda7fd4deab1991f17eda405a233e3
-
Filesize
92KB
MD516597d247d83617f3601d4d9cbfaeca4
SHA15d8465df68ae7e1c1f97324ad10ec054f50e6f8c
SHA256ce3202d7c48c87a34eeef198bfeb5e6e82fef7e97df56d73258caab830238d6a
SHA51227fd76a4373142fcaffb71c62e03733592f9141ecccec130bde926070f820e4a37c95b96580c09c39aaa3025238e075416117c0bd45283eabe445ea56fa7d58e
-
Filesize
92KB
MD595d664f73283b29ef9230977a7092fc0
SHA1693514a3854cdd0d433486689dff0ac6b627e9a8
SHA25631142430e7f251b35a35250b416180cc17f253f4e2ec87477650f97b9fde8605
SHA51223c32d5a2eb9bcef7a4cf3280c0150f446f6e409857082eb1e55b2bfbbd3a44f46ea8598726cb63c2e42f244de3434f5b0669610097b326a08ed2f6f10ff4655