Analysis
-
max time kernel
26s -
max time network
19s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-07-2024 21:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://supplierportal.gainfront.app/accounts/password/reset/
Resource
win11-20240709-en
General
-
Target
https://supplierportal.gainfront.app/accounts/password/reset/
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661568153614186" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3104 4572 chrome.exe 81 PID 4572 wrote to memory of 3104 4572 chrome.exe 81 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 3996 4572 chrome.exe 82 PID 4572 wrote to memory of 4892 4572 chrome.exe 83 PID 4572 wrote to memory of 4892 4572 chrome.exe 83 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84 PID 4572 wrote to memory of 4248 4572 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://supplierportal.gainfront.app/accounts/password/reset/1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef811cc40,0x7ffef811cc4c,0x7ffef811cc582⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2072 /prefetch:32⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2136,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4620,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4924,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5052,i,14217040436171030678,6197369559432726387,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1592
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004E41⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bb983829098bf70ca25d5b33f22238e6
SHA11b5c6180c35daa157495da7b77c5485b102ad195
SHA2560bc6d8412d66e954ae58c712cb2ca2e7f53dc9800c28dee0edbeccb9ed657496
SHA5125a25c7caa297f82505f95a18974cce8480b21395b356c9fd3cf91416a044a4d4677415652cdcef1cc37254aa82d2b64bc64a9984867b4f4b9dce7329baa460ce
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD599675e03c469c8a52fb4e99cf0fcfa82
SHA1ce65e8de0d5332c5470e73da9c3fdc337fe60f15
SHA256547cc71fc7988d2857b415cd7f8f523db6751f00193470beca2149023891ee6f
SHA512ef87e2a6011094742173a51a091809f35269f3427cf8c6b25e58a240e33b4002aeaee89b0600f014e4b7c38939280ecec43e13114e290353291ad9cead1fb4d8
-
Filesize
9KB
MD5bf13f521f8bbc92ddaef9e7a0dd90d69
SHA1c166f2053f463110ade04191374a372e327538b5
SHA256bdae3bdb7772a1668aaead08c8642409a29921fa4375f369b065a57bf051075c
SHA512894e5e34e93c947c2960005a6863e5833a6ef48f5927fa6cc8550c2a978e25fd5c6476572389a536324b04c348b5fb20dfe44b89b23338359a60cab5c5488a99
-
Filesize
9KB
MD58cfa66db46fb3cc6bb8bdc01d65015f1
SHA1e70bb72fb26a7b1440f117d98509771c8c0c053c
SHA256e170fb13435fea9385f22c93d005a5219f5a6056f465582fe2c23e217eca3755
SHA512a29cfbef599c5aa6b29163579c80ae336e69d4fa7845ad8862a74987d07594bda48898acb8fc0bb82002be8f4537311967e09b960f4a6b2dd47a1331d46c3a1f
-
Filesize
181KB
MD5b24867d2fbdb3f585fe29ec1a81bcdb3
SHA19754de18ba49be7318ddefd57eb9c72badecca85
SHA256d5e9b06a7e501a24cb1f316e945ebf05477241a82b70a0bee1b9faea56127c36
SHA512b69b923dbcf77b79bb88dd5f9e0fb096aa6802d66ceb4b6d555eb812f8c9ca7e5e924fd03ca30b6d999ea8c960faeee2d36490388930631ae5a1c4cfac124094