Analysis
-
max time kernel
44s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 17:08
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://assets-apj.mkt.dynamics.com/8d3007e1-0151-ef11-bfdd-002248ee0d82/digitalassets/standaloneforms/114224e2-5054-ef11-bfe2-000d3a863fe3#[email protected]
Resource
win10v2004-20240802-en
General
-
Target
https://assets-apj.mkt.dynamics.com/8d3007e1-0151-ef11-bfdd-002248ee0d82/digitalassets/standaloneforms/114224e2-5054-ef11-bfe2-000d3a863fe3#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676106986559648" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4812 1504 chrome.exe 82 PID 1504 wrote to memory of 4812 1504 chrome.exe 82 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 656 1504 chrome.exe 83 PID 1504 wrote to memory of 1868 1504 chrome.exe 84 PID 1504 wrote to memory of 1868 1504 chrome.exe 84 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85 PID 1504 wrote to memory of 1964 1504 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://assets-apj.mkt.dynamics.com/8d3007e1-0151-ef11-bfdd-002248ee0d82/digitalassets/standaloneforms/114224e2-5054-ef11-bfe2-000d3a863fe3#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd183dcc40,0x7ffd183dcc4c,0x7ffd183dcc582⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2160,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4420,i,12512418621313796884,3390270016540614496,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\682882de-22c2-4a94-92b3-a9f4bb2c8893.tmp
Filesize9KB
MD56bc35059d4c8f0194debdc23d1cee53d
SHA1a58e5c7897f6a6fb7aa6d0e90ddbd4393fbb41db
SHA256419571a01d305cc4da9a6833ce763332673047599ea3e4152a5d14ed1e24389c
SHA512ea43895a7a579e02551984d1b1c3f91557bf08bcb3a50a1240bfe38945e9bbc8227bc031d2fea13fa1609d889457e903dadb79986f04c52bc983892ddccb5ee4
-
Filesize
504KB
MD5109e3a822c58ebc8e7597bd8003986d0
SHA17de7f25a9e4b3dd227e73f35bd3e82ae295e90ce
SHA25634a1639e3d3284af9f69ba3c87959b06cd38a039a4af80fdf52b1010a64abcb5
SHA512d7a87574425a5a5ae6ad407883d09b4da6193224617da70476a93fc1fd23f0f7eb6183cf3d3102a821b8972751f0d01b9848d49dca024aa41e9d5b50b16d843c
-
Filesize
432B
MD5af2b9af9952b239b8058d248f803eb4e
SHA1d533a04749992213156f6d3ad850abc9d1e6cfc7
SHA256424a08c73d99c23754cd92c17787b0ed5e77a935759c47e1ac56d042537b3d0c
SHA51222d30ae0c41821b36fe0ef1433f02720d25fe6206b6136134794cf3c772a432590526ceb9e27b8cdd55742fb7f046379dc7357b3ce0febf46a8aab3adf1a8f05
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5094d25402003a108b0184b282cfce90d
SHA1c6f7fb1d7870e887bc64b808053c2da21a8a1996
SHA25677a7b041b0f4869ef216d607a6fff64b359c910842b98ea57358a2e1a3d2f2fc
SHA5120c499a92e9b36f05364554010ea89d6249db735a520ab767b89f9e6e927986433d43d501e403f330bcf99311aff2d8c40308d25f66a1529e47538ee9f8a14c7c
-
Filesize
9KB
MD5b44e27c62464c1332c1a4884232fa942
SHA160a0641d0ea23775510f1a300f12e95446f1bac4
SHA25632221ed2bcc65f7b8f2b7b3e43185df001c4181530f56fa0a7c7ed199572a702
SHA512eb7460d0c1fb1419d477f7fa046b61b77156945e1a8e98796059d1c25883941f75d66555417066e1653f4bc992cdbfc99867f02936b0aa68be28aaaace0be734
-
Filesize
9KB
MD587cc0a8d6fa1ff988dee07309bca7851
SHA13677213067fa0b8e499ea1938c70fedd8766b4b9
SHA25684628cc81c2fc32e002f4f90b2107ce2cd2ee323aef853be9ae9850b28d15a1c
SHA5122e96260f6cabb4317ef377798135a5dcb9c1b222ae7acc01003f016545416d393831a77eb78cd3586192a13740148c009ff95d7baf15b22ba20ad10332908d07
-
Filesize
99KB
MD5b7f99c82af7b81dfa81d696287bd6551
SHA1a9cd2c8ad1d04bfff132bd4d60df46d5190aaea0
SHA2564b3aa7aee1c3b7b3a65c0e851635a1f086c38dd07681e6486ca33326cd68d6eb
SHA5122839feebfcd082b67cda862a8307d0479a7401953347a4e37a0c78fa7527d1aa83a83727ca222a8feceb1502d30f019ea5bdc445f2ed6055f0adb0f66cb2ac97
-
Filesize
99KB
MD58b7c2332d9c7f9d1da0dbdda2eacd5dd
SHA160ced39fe93563f51b055f60ceefd65c9a6a8f59
SHA25640ebd4cdfedfc25275b74eab618dc2f1f3f32f25112e65b8ab7b1cc9f97e88b1
SHA512dcc0389416cb4c20c1db4f4051ddb423b946685ed99be6c9ec25a6a14ead07d312c411117a09de02327b38e860a20400293672bf4015f4897d080b2d1a9fe96c