Analysis
-
max time kernel
57s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 08:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auth.usehorizon.net/
Resource
win10v2004-20240802-en
General
-
Target
https://auth.usehorizon.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133708608170701880" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3200 2452 chrome.exe 83 PID 2452 wrote to memory of 3200 2452 chrome.exe 83 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1392 2452 chrome.exe 85 PID 2452 wrote to memory of 1160 2452 chrome.exe 86 PID 2452 wrote to memory of 1160 2452 chrome.exe 86 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87 PID 2452 wrote to memory of 512 2452 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://auth.usehorizon.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe54e3cc40,0x7ffe54e3cc4c,0x7ffe54e3cc582⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1768,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2228 /prefetch:32⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4044,i,2374991138097467816,8010772651132231565,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5005d3d66c79b72e4f7563c5c337c5f94
SHA1ff1f0b98509fb3434519ae5aec2cff9cd58a72e3
SHA256f68e0deba6c27cb8a859ec4c9bc05aa03a88f29c01bf14fc0a7cb9cccc9468a5
SHA5121d11478def9e5d3d8eb9cc5b1373f7acd1004b3542b0b9ab38df8055b74ea0e7f9712059bc61a0e7ce2e8013bff3e9b115462df390ba7cbb049d56e73169b1b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5e7a815c549235fc1d8e19f1ad5f5a963
SHA18f4e39110e9fde09bff1cfc7d7ae84018c120d4c
SHA2568f18fd540e32d762651e6e45f0b93469f7661c058a07f7fd6054df068f86ac41
SHA512fa74540d78cb762ff00e1e8a0c623503a8c8ccc1dd94a4d55fe0b52705b079c5d0a0c4190ec3d964295ec322d53264624015aa9566b5a3081a99cc7ebe92ee5c
-
Filesize
9KB
MD536577f43ef4b1b0725abb3ea943100a4
SHA1ee58435e9b2efdbda2099196007c87f60aa51e81
SHA2567cafbe05cf0e77bf958c9467556a62053f73eca0b39a62668da4bbfe85fe2ca1
SHA512e77b19bf83a26c8ff8fa664b848edc6b3789c7c5c4b40232dfb4889dda5ef2b02ed37762046404e69b00d7c86da964276d51926f4a4824851bf5a292ae4ea976
-
Filesize
9KB
MD53583783253926eb68fc7764fe60ef179
SHA1ed47aad927a8f63d68c77920a7c3fc484702d8d5
SHA256a4a609269514314df1ede8dcb014243a577910a6a8b296aeb739e0e2cc342298
SHA5125af4df3f5490703ccc4e389849e4563736540b509e59d6e9e7c56c927ade10c5d25a3ceb88f5d74c1f0229498bef190236610006ed5cb4a1433f331c16a3aaf5
-
Filesize
99KB
MD56c7e995fb031264364bfa11b112987b7
SHA1cfe05fd7679cb2f4c8f7d9d19d558ee7adf1ebd5
SHA2569fc53a5b7fa4443f6b28adf6f083496c62d0112b288f53757a48e12ce0db8f10
SHA512f792eb2e358087ca65b1664942d4a71f6e08d0ec491e174ccd92ae1d685d7e18edffbe017e158a29b4cf9d8a8517387c121a307952997bba2c9990f1f727199b
-
Filesize
99KB
MD57eb6ea5b001671eb9f8f5726377dac81
SHA115c174238e66e43a59e74f1e0f720817aa906af4
SHA256b60f5b5d69b94732d924d2b71adb3bdf4363116533ac34777046ed32e2019250
SHA51252735f6681ff730eab633135e212a3a845e15bec64f7777215847d25fcd357a87437600010f726c41d71467f6fb1dab97d094ddd0f040bbc3d5beb316c189af3