Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 05:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tasks.teams.microsoft.com/teamsui/personalApp/alltasklists
Resource
win10v2004-20240802-en
General
-
Target
https://tasks.teams.microsoft.com/teamsui/personalApp/alltasklists
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705071813262948" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe 4996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 840 3292 chrome.exe 83 PID 3292 wrote to memory of 840 3292 chrome.exe 83 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 4600 3292 chrome.exe 84 PID 3292 wrote to memory of 2156 3292 chrome.exe 85 PID 3292 wrote to memory of 2156 3292 chrome.exe 85 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86 PID 3292 wrote to memory of 4696 3292 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tasks.teams.microsoft.com/teamsui/personalApp/alltasklists1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8b7c9cc40,0x7ff8b7c9cc4c,0x7ff8b7c9cc582⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4632,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4800,i,14371730259250947728,58939162384749166,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5af8f31947e67bf79d5f4a406a9e911b0
SHA189268d3a2c817f723c6f29de3b39c08ce8ba1f14
SHA2560f0e187a89bee2b7a49c0af5cf5d7606c1f9d7f9b25c9c7f900d405abaa07136
SHA51204323aee8153cb4fdf38530295274c589990988c9e99e3162529cba7a21e6427f126117a4def94146845339240fa401833a4adcfbbacdbb2d7ef5fedc66acf21
-
Filesize
1KB
MD5f77bf24edcfddec95ce308fbd0b1892c
SHA1e45c592b45a4fa7bd7582a6ed0375d69cd192dc1
SHA2568ed6fbd5a1af03770f76b7d8566084f59ba73209e712c5042fa466f67e625299
SHA51241f2a8daea435bd0e666ce8c948673158b0bfec3dc4324bf58ca5b722c562465b0a88ae2e318c234887e6ca2a9aaf9a466e2909205809c8526691f2a2c0d6e91
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5f475bf2322afa3ae15300e9368aae513
SHA10e3a0556a71c129c67ba061bda2d71c354c97ca2
SHA2568141ff50a0bcb47432a201f5d96e999d504acf43fee84782a5c0e1b71513afde
SHA512ea740c32c66f460a0e84d92f946c3a30fa5ab5f43823ad36c06449ec0e457c324f7f9efd5a6e11dd3db7496086d32b841e7c9f498df4b1a46acc3b7ffb867aed
-
Filesize
9KB
MD500def9dd3a61158d911ae29d23569b1c
SHA12eccc44bd8a0165b3790c1e2882c07b7ae170701
SHA2560f13c791e84d5d8c42ea96795b0638542770c45520eb7b8215843e5e4ec6c5a0
SHA512652eb6d8e7a7aeec41cecab96d9bb8325e258e9ecf4cfff7251dfcaa357cf553b5cb80a03c526dde07d37e93b4f592f4d3fdd8e52c584d119933ac04fef6a87a
-
Filesize
9KB
MD5b2480c97fa11b123cc24af662b356e2f
SHA104f2045f58ee777466837cea6719dc88a24b99ed
SHA2568d5be94cc4f8f50b4383d396018aa13356e9877012d35bb3abf1666952ef9ee9
SHA512b0187a658c5f2bd2059ab24e2130ff24bb47e82fa51773d273416ba1a2c869154eeabbc539c922226cfdadd5fd521353614363d317aa74d4aa3cd009ee2a1e20
-
Filesize
9KB
MD5141ce47599e307b109ae05504c7b122c
SHA12e8a0b75cc408b66f754da94665e470de5059f1f
SHA256ce5c52e401102bd42f98cc2910b2e80aaf24ca9bf1478f2bc28e2db25b05778a
SHA512494f26178af02827b323f49cf3caa976069701ccfe1eb79d48789dc1914b2c73542bc244a7346fe5541fde6be920d5464606df158d61a32b89d9dba092e7cc3e
-
Filesize
9KB
MD52df49c9dfed6c2b47ada815b026fa492
SHA17ab66bb9bdb794d7ed5c7f243961098e66c11b8f
SHA256d925994d907c7cb9096e3e7deba5dd6ffdb26ad9d4c2582e6db7ac4a8c2696bd
SHA512cf001c98f85b05257456d64e7f39fd5b5760d373cc028165e703d0a22c65b7e51a9e66fa1de1a34d09fedabba9434c8a238048f6ba27790b6d73db81bf075d3f
-
Filesize
9KB
MD5459a7791a96e8cb0646aab040b1c7fd0
SHA19a18ec050d04f748b4cb95b1bc4080930fcf52cf
SHA256d1adfa1fa290e192c4b1725429b0c58a0a57d5e4809c58a8fcdd4b18584675bf
SHA512902473a2950d848311ec3a7444d9c6f214b5dfed18572bf7a05ffa20b1d1004d719e4238bfd302860c29ed4751f41164f41656754bc9f00dd53e28d3515b5325
-
Filesize
9KB
MD5b895420cc6d8fd31af5783e62fbe33d7
SHA12f0c52329923a87d852dd759eba7044ed4f3d706
SHA2566f94694483e67e918d39cd5ee451c340b09f59fc9eca459f4c0a7d84f93a0eac
SHA51247b02d44107d215b46b6ebd41fec9276affe99916801d0bdfe0d01263c49cd6ab7c903d24949ac5b33612f626a09706db043a44c69b31746834cb7d8ab410992
-
Filesize
99KB
MD58a2a7d18afc58a84a59794b9ce3e73f6
SHA12a1b5f0715e0cae7ee557c28290c292d9e682fda
SHA2565f0360b5cc562e66771b29e71292a78b9da5de1201acff72440be4017368191f
SHA51287ae5696bb6dcaba14dafa953758dcd99f0fdeb9e8f0ec668293cd09774aea62601e9bcd482cca3a55e709bc959061f3ad548af6db18ff2f9fd20b9b5731100f
-
Filesize
99KB
MD5901b66339d790a2d7cb98b517cc3a23a
SHA1693b66de302e4d2708310b75bc5fc8c722bc218a
SHA2562c5aa01e21cbfcc35930f79094212ac426a8a6c761acf26050783f93af69e396
SHA5120d467aadebe754ca4ec371739fa4807c7710bdf5719571b40aa51c44cdf120a5ad9e68d4ce8cb4d5757c6a606a6290db59c2d488290e913c29dc427a09693ded