Analysis
-
max time kernel
60s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 18:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hhhso-my.sharepoint.com/:i:/g/personal/lut_vanautgaerden_hhscholen_be/Ee-o7xzLweFEpLYvoCtHnGABbgJrUC5PB6jaKo8yE--HeQ?e=VFpP6a
Resource
win10v2004-20240802-en
General
-
Target
https://hhhso-my.sharepoint.com/:i:/g/personal/lut_vanautgaerden_hhscholen_be/Ee-o7xzLweFEpLYvoCtHnGABbgJrUC5PB6jaKo8yE--HeQ?e=VFpP6a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701219646622109" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4860 chrome.exe 4860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4860 chrome.exe 4860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2936 4860 chrome.exe 82 PID 4860 wrote to memory of 2936 4860 chrome.exe 82 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 4116 4860 chrome.exe 83 PID 4860 wrote to memory of 960 4860 chrome.exe 84 PID 4860 wrote to memory of 960 4860 chrome.exe 84 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85 PID 4860 wrote to memory of 1108 4860 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hhhso-my.sharepoint.com/:i:/g/personal/lut_vanautgaerden_hhscholen_be/Ee-o7xzLweFEpLYvoCtHnGABbgJrUC5PB6jaKo8yE--HeQ?e=VFpP6a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd183dcc40,0x7ffd183dcc4c,0x7ffd183dcc582⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4852,i,13882011981229016928,9984484706179252334,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55ca210ad44ab9b0c630c62bde0cff786
SHA1a58509a273c9223b492e1a3ed7f2ed1f482bd60b
SHA256fbd68d9a281e99d0686ed65b398e60c3b5a4508d1b4bbb2c90693ca3303fba74
SHA512afec56447a70eb05fbad87272e2d1b3e8c0116fac96fa66ca0c4a0b2e568f1d57a41f0aa7d8a56144078701536b59df62958a0426783ab96754d1f08ad0f5793
-
Filesize
288B
MD54f23c3e4df48d7bf5c57cfdd13566977
SHA17a2e6cdc19fd82c0aa0f00117052483a7f641544
SHA2564401ece56bcd4269c740a045b98300cb4403e5fb0eefc5e2dd2f1e5db1d1c89b
SHA512ce0835366074d05f4b164ecb87e2d2a9e8e8df486846a06ae14d031f227e393b801998a3fa415555cf5c742668a55a16aa7d20935f74bb72d94a13dba660daf8
-
Filesize
1KB
MD5ef67b280e04009c844fc6fed52b5862b
SHA12c7f1f40c4ac0e5e54164b7f3d622ab29667a91f
SHA2566404fa8c932fd66902b35e00a5b78edd91df5f1bac57f0446de772faf4c299c4
SHA5127b6e977bbd3775d80edfebab723ba3602469c044078076585c9ef19215a4edb3abdc77659a984a988aa511dd14bfc14c37586ac6b8a1f5ccf8bcd34a8cf161a3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD5742290a575e99624b17d710afc4ddb97
SHA167c8f500a3bb56933894b01d20826f03ebf67610
SHA2564d361153eac7e63b22cc24d544794a694a0697c3dfaafcd90624b229e856459c
SHA512ea636582f63a4e806e8a945b73ead565f0a5e5178b847c36fba816ef53eae147f22c05bd87e8c304c2cc1c143d6b6c8a38acdc92e786926aad71b5acd34eb346
-
Filesize
9KB
MD5cdad1416532d5629499432dbf0c8c091
SHA14f637848bb9e7ef9609fa6e6efbe553e0634cccb
SHA2567af88fae272c3394556e5ebe21e0670210d352b004ba5b4934466820cf244efb
SHA512dc6522b39281c6cbedee06a360d13d90f644c4508f5506a058812e233bfac5ac67f405eea4ccc46fe03c389ed7c6b84931cde5f4608e146987161d32a6328826
-
Filesize
9KB
MD5657f81e5b947ca54a60ff9e91498ded9
SHA19e3249a818fa359a12b95cf366c61683106a11b5
SHA2566eaffdaa66f79fb98013c84a652d465ca5a97ecaa21af645d208328eca8b4950
SHA512e2d6853f2164875a89b89c80edd0bd652b9a4f0fc7811ced67c72f06fa40225fc1905a4cd60f2a64e775503fe36e4b1de56fb5f1887c6e881ac9f0ac26f12022
-
Filesize
99KB
MD5020b87002b9b83b66faff3415e13adc7
SHA1fdf49b57995f4db01ffc38f423d00a9c56ee6d7c
SHA2566b098d846e80e4fbdb29eb72df11b0bd339ed241e3786add183ec6f65f954fbf
SHA512eb88ab209b0bf16fd079b0b0dde101f2ab4d5a8aa4d8eaa45068983664e9a6dd4b4532c49203a1c776c84516a948f7fc6856b2193cf061275a36cacbf10c95bf
-
Filesize
99KB
MD50001730fda585c949e355fdb4fdd69a8
SHA14444eca841578285997331f2425daf1e9905a2ce
SHA25693b6074e2c3c37c065fca33fc18701f06fa559ac70b2bd0aa034d90cc1dff5dc
SHA512ed00587f98d2f76cad0d9e80fc043522a2b4468c0e8e681956f830b6091d972c4b6f1496de900b9cc9083def5a77dcb8e07a79417febe208fbc3a9fe90bed919