Analysis
-
max time kernel
14s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 15:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://amazonexteu.qualtrics.com/jfe/form/SV_aV5K2sIYiQAlTEO
Resource
win10v2004-20240802-en
General
-
Target
https://amazonexteu.qualtrics.com/jfe/form/SV_aV5K2sIYiQAlTEO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687293753938987" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 912 1168 chrome.exe 84 PID 1168 wrote to memory of 912 1168 chrome.exe 84 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 224 1168 chrome.exe 85 PID 1168 wrote to memory of 2124 1168 chrome.exe 86 PID 1168 wrote to memory of 2124 1168 chrome.exe 86 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87 PID 1168 wrote to memory of 1752 1168 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://amazonexteu.qualtrics.com/jfe/form/SV_aV5K2sIYiQAlTEO1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6030cc40,0x7ffc6030cc4c,0x7ffc6030cc582⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2036 /prefetch:32⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,5171997498697385358,8386469791758278686,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54565788b0352191a5d53050d603b5734
SHA15f64218464dbbe50ffc7ee883773e153c6fffdc3
SHA256411a71508ab32b8ce556e03b35423c4d7c6959f3d2684843afb06d070c2aea9e
SHA512801d36d4819e9bd6fbd1e47a972c68e9d46b810f15dd93e8e76097d476726657a3191d012f9f48ff1416b348645581c02dcec004422ab99a42bc7c19e280021d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5a83957e3ee52999b27c4bd4fce2ca165
SHA19667441b005612f373e7aee6e49161217e9ba4ff
SHA256f10b685953d1acbd9253fdd404f675ca8865dbda821878bfa8b921eeaf5776db
SHA51216368eaa1addd2027f4a017413361ddff93524570ebc43c5b30e0f9d1e6bc7e83f554977f20f10f8870b8acabff7381d986ac4e42e3a77377733c9b930e64596
-
Filesize
99KB
MD58f3f383611e3422d6f21cebfc4c24eba
SHA1ef30f55658909e518a280a86c5ac3b5d25c90c06
SHA256cb75f3e708ed62b174adb1fffdd95789dbe143286859cc404366dba6bb1f051f
SHA512bd965c052fa6f744858c7473c095fece251ac257fc16a02c845699c5dbd11141512bf7d2fbc2eb1a88e8abfacaa5432111771fcf554ff8cdcc735cca6f633cde