Analysis
-
max time kernel
64s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 00:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://utah.navigate.eab.com/
Resource
win10v2004-20240709-en
General
-
Target
https://utah.navigate.eab.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652172733536401" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 936 chrome.exe 936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 4340 936 chrome.exe 83 PID 936 wrote to memory of 4340 936 chrome.exe 83 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 8 936 chrome.exe 84 PID 936 wrote to memory of 4632 936 chrome.exe 85 PID 936 wrote to memory of 4632 936 chrome.exe 85 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86 PID 936 wrote to memory of 4916 936 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://utah.navigate.eab.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb97a5cc40,0x7ffb97a5cc4c,0x7ffb97a5cc582⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,16300562951339159601,17956713845318199667,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD596e14a68735d76069fedc78d1064c615
SHA1a93813434e6b4786a8b4f22ee233cefebe29ed80
SHA2561493c26f268c5ea958cabea4c31650438d03c6426d54b5191bec6ed68d8733c2
SHA5128eb2000176a007b7f46bc8178ddf3ba79a1f85377a35772004eee9405f955ad6f2dc4827bd58f2e0ea952c4426ef0e7ad6eb717a39f494ee886300ad550256d0
-
Filesize
1KB
MD5149d24ae70fe6712454173d1ed192e68
SHA1abfa7e2e17c893d36663245aae78e255fcfbf8e2
SHA2569db1ed8c3d6bd812d02e62965594c0d7475e6c3aefe8ba2cfb108033bc4db5ff
SHA5121d283b4e83fb07e264d7a1e6f48f873a56f4a9b4c6c7768f717315f6ca18020f1d2c74a3aa88dd784a8bef5630c56ecab017ec9ff93f0515e44ebde7f57bc63b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1024B
MD5f803b8530618b8dd4fc5910ddf710b96
SHA122645f21343c0311cb37b3e4dcc0c2125c023f8c
SHA2568c242450fd97c9866f71a1bbc17ba2dee76f1e76b61f8cf6eff96c9f5ea9ad2f
SHA5126256260a8105242e2b5d982c5803680d9f896a8e8ca0021762462cd5c022931100dad8a008a3e08931a45ef147b70935e869313cea8945da17c7ce570f3e08a1
-
Filesize
1KB
MD58c020b644db4cead33c4e056d374fdaf
SHA1da7798c2b23e0f455af8415cd9befa2b64747698
SHA256ca035ac166d94cad7ad0b637c63c832e70bacdda58f8f6601c47dc177e3f3e19
SHA512c5120cb99f73bfb13dfcc216b7e58075a524d2f098d3a321621d4836e664746cf76ec796ef4b52401a75398b68ec7cb02eb50a3a63fdbfeb9bcd382f83a70795
-
Filesize
9KB
MD5f53ee95fa11b63084b4da7ece30d0b8c
SHA137ffb197d8193b421262b0a12102c210b9c1fd26
SHA256f62a74ec8ae595161237e11bcd0ecbd5cf3663f29bb47bca33c25ca3456b86a2
SHA512dc42b08e54c13ce42430e0a54d17f8e4c38a2358ac48b0ed87a97bb76f3cd3ef6cf474fbcbccd2e92bbd6ef7392481a8d694cc5036d42e0a04235f02fe6faf8f
-
Filesize
8KB
MD535f0f66a2a93a355de549926e4faac6c
SHA111f5250eeb54615c62586b6ab526bbbd3601bc57
SHA2567828bcc6f34dd44c1b6fe6012d31ccdeb14499a9f34b657f770171a933592f21
SHA5121e810f96853cad9c6a85d3f353c829e225d5bf7786aa2147c773ec1a9f4108703a4850d0b1eacd2ccd6d98d466fe5f23b6fdc9176b35fea6a6aa04a7007e1dc5
-
Filesize
9KB
MD522f90a6d3e882c824bd3a92201f2096f
SHA1665446bd49e518879fb0383d5c3deaff24e483f7
SHA25653880524b72b64f471c86a1b80acb9b1f486db221ba8252bd370cefe0ab3fd0f
SHA51233f1584b82c9780288ec3e3d4100d9817f1709ba8a70af9929131e2eceaf1c8edf5dd14f325aa439106bb2e04cbfb56ac05d85cd195d44a0e9b88acf91f6e593
-
Filesize
9KB
MD516d6996b8e3f6ee92f1f4dc12013375b
SHA1b8aad079be73e6424eeadd978c75803be9dc928a
SHA2569eda248697fc497dd4f016947dafa332d9d6b583695c840b07943853b2bc07ab
SHA512bf9a6ad44853e6aba4e79a5806cee3285ee99c186e263526bdd713c175eeb25f7d52a9202565e0168ecae2242145e1bb079b5996c016ff10eaf5c6b5d22b5915
-
Filesize
92KB
MD505971bfa6b4380cad9bc7f9dd11b9ed0
SHA1a98d12157d335206adf4718984e7df6febb2d908
SHA2567184bd1b226de91e4ff24a3d0ba0994a39e8fc3efa96bd7d4e51c91ebe739a6b
SHA512be61494797cf8325b8b151b639177dd49c3c4f4b59d2522b694763790078a63a3fed027568b060f81b81c212d0de96b9372f41864f2ea5851ef5b4d4afb8bc29
-
Filesize
92KB
MD5eb9934be7e5a705de74c199e0cf91b87
SHA1df86d121aeeb8287a32f0f0986cb02257bfaa996
SHA25695571c8d4793f3be96609a6a7b51c2ab42d173631748d8c5cef6be312f7be243
SHA5122aef47dbb4eccaf9efbcd7efa7b96de0b6ac83550834b43965a73d1dabf2f256319692c57499259b18849cb17f18114fbee528932ccff4531cbeace98c7a252c