Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-09-2024 19:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://agents.allstate.com/austin-park-lakeland-fl.html
Resource
win11-20240802-en
General
-
Target
https://agents.allstate.com/austin-park-lakeland-fl.html
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133706437662705273" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 1436 4624 chrome.exe 79 PID 4624 wrote to memory of 1436 4624 chrome.exe 79 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 1028 4624 chrome.exe 80 PID 4624 wrote to memory of 420 4624 chrome.exe 81 PID 4624 wrote to memory of 420 4624 chrome.exe 81 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82 PID 4624 wrote to memory of 1672 4624 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://agents.allstate.com/austin-park-lakeland-fl.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee699cc40,0x7ffee699cc4c,0x7ffee699cc582⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1764 /prefetch:22⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4552,i,3067179459776909892,3042452049152800864,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e162dd8b3b59caf10fdacefd60d64537
SHA1584783ad7028065b2a1d98e5fd1a74a3914c835c
SHA25659ccb39dcd0baadfcbf86c50e7cf8540a654b3dbeab1e2668435554c6c6ddfde
SHA5127fcd7c8bbc79b79f35fbedfb91ccfb02b7cedf66150c037afad506d7ba555106cb545452546ddf68ad74b056a515074912f1bd795cd9fcf9a34e36d64cb6372b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD582651fe3895165b7b515abcd15a49ca0
SHA1d5a74e2bb89f0d27bcefaffa4043a651b6af8b24
SHA2566a9e4bcb9f025f246d213d6643741028b2ce5e150ea3c42cd015c1e3b2552122
SHA512242505ead9718bd5328f6d3148d11b08ee306a2b98dfdae10d9372a74c1b610398bcf8d4250ad10be0b9e5728424254895df9e45754f8b64932eaf8c90740ef7
-
Filesize
9KB
MD503d7521716ccc724d8632c20f4094644
SHA113b74a5c6ee7a75190a570813b6c8762e83240cf
SHA256cc3ced212d6ff9f5a157409b349285f9a21d25326dbd1245f29b0cb7335c1723
SHA5129387f15cf26b3121cc518c7f61ececbb991b8acd97b0b13d8b407c36d87eb333e47854bd78f6994c7d0e5e25f7a1593032181495e7192c27067f214875cdb997
-
Filesize
101KB
MD57999132288bcc82327eac430653a0b4e
SHA12868120674f8d0ed84ded5cb7ed02de8958b6fad
SHA2565490cd588af4bd3095bdddb4572905ad22e5a821a6c91c575f8161b508cf523d
SHA512d4cc8dc06f6ffae67e860a5fbc24615e127921751bc37d901e135bdfcb0a2ec560d7d49314b7ffaeb9845c64b1f883efe0d4e64509d0cef15262cbaffa84cc80
-
Filesize
101KB
MD597027615c07990790765a78d892395df
SHA1e5d4e8db3202be8ecf795350e61e0dc7cd3ab90e
SHA256c56ba69df4b6d23e5117e7d87b0fa86c51a160c6f4e31b8904693ab9b9cde819
SHA5124230b35faed276e29512882fa1ca5f2092f17a58196f4268a4d775552143245d08e56ec2aebcd200c202fa5274513aad58f97b89e13373b1793d05e5f2a83e3c