Analysis
-
max time kernel
24s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://padlet.com/nathashawyllie/page-freight-rfq-l8x9u6rrwkjxfoj0
Resource
win10v2004-20240802-en
General
-
Target
https://padlet.com/nathashawyllie/page-freight-rfq-l8x9u6rrwkjxfoj0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133711922661745981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 4828 3852 chrome.exe 82 PID 3852 wrote to memory of 4828 3852 chrome.exe 82 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4872 3852 chrome.exe 83 PID 3852 wrote to memory of 4724 3852 chrome.exe 84 PID 3852 wrote to memory of 4724 3852 chrome.exe 84 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85 PID 3852 wrote to memory of 3996 3852 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://padlet.com/nathashawyllie/page-freight-rfq-l8x9u6rrwkjxfoj01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffacb7cc40,0x7fffacb7cc4c,0x7fffacb7cc582⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2008,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2064 /prefetch:32⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4760,i,75176279587365261,11116105562162118470,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ff71c14bfdd54a34929cf48537728786
SHA1c2ddb5007b1c2a3bc71ce3c91db9df8ceb10e7b9
SHA25601a943a46dca3a58bd2be446feb3e5fb69aa4f1c93e9415f98ecafd4e4eb1c55
SHA5129a62a3158a2f77b75d40688c1771255b475702afb25027d6fa64976a8abd03f8cc3cf1661d418b90cd4e13860bf6946ddb1abcc225201607405e00a4e72b4240
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d2676891c7a2ba720711154eae1c89be
SHA10156ca44461ffb83e1e86a6143f76ea1987a2619
SHA2563a50d939137cb5ad602ac5e737f0fee8fab98fc7a1f1a4ede24337ce703f0044
SHA5122f6425e405a3e8014187a0a479256509f166911a47ed7d507e5ef8c4670a913a5da879736884b0387d8cbba58af9e4110d4bd81e2cd1b4abb4cb0083cb081dbd
-
Filesize
9KB
MD5600de4e34848bcbcff1653128590b0a6
SHA1c5f23f513019ab5330fdb13881b122c2a6b21efd
SHA256e30b6aa884a36702039e8a3dd8cb8df7ea9dadd7442bb05dc24dd81ea1edc999
SHA51232dc6408787fc38d084f49cc5506155e93b67c94bf7abd2b848e19e3739fd601daac8a6a49bf715cc646acf3f2a4e511d0bac887f9cc8c771a63b8031eebc2ab
-
Filesize
10KB
MD5a76f4ea9ba0f997d2b8e7059b41ecbf1
SHA1500151e66c5bbacb8da50652e504c9299d02936f
SHA2568954023ccc076859547f43b5c4cf64bf16fc336f38075f5231ee326d85e30708
SHA512d3e37fc4ab47693dda4cd7fe611178c8116159f51461120f788472eceaa7cabaf04f5ccd5ea0506aec5e12048d1f8968fb812b7c92deb570c5fbb3fe51832588
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\e525145d-aff7-425b-a748-b52284cf1820\index-dir\the-real-index
Filesize144B
MD5023eb969946ffed04882fe1d02beb77a
SHA1b7e19473ea54a48506e4c807a84a3009ceca7db3
SHA256c58845f32fc3bc63e1d0a74a3cdf20842d7d17a0baf0ce98369b1ed488407d25
SHA512e9d8b619c01b22d0ed166cdea003691ca323a13cf86fc9e8efc43968980f62144031b55ec5447b2672a3d788f62f4f3c16b06621903e90663af67c2017fb0d8e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\e525145d-aff7-425b-a748-b52284cf1820\index-dir\the-real-index~RFe57dc18.TMP
Filesize48B
MD5b42c66b909e07f3c8c6d1a2e441cb6fe
SHA1aad0fe63581831ab166ea81f0731db0b6c4c0eab
SHA256e1d237e62fd942d497bd020ac9b2f40f76b93358c2459ad4e772178c245e6401
SHA51227f08156c2c65dd049a684ff96e73c6eeff8858fbdc2c3d2e7332eb1b011712fec2126dcfdc2560b71dbcd45f3728a72fcd1988f812391ff0f7de6aca0fe7e11
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\index.txt
Filesize115B
MD5d1d237db7dc9942c119b31589ddcf0dc
SHA107e1808e0cf4c3465c6e3edb3ce72df734412851
SHA256318e9c5542f68f579961b0b97ec87d9ff73e54b6bb27f52c6adc8cbea27cdb27
SHA5121330b8a8aa9d90442ff4c7b017ef5ca6c6606a25604e084b5e9989411a11d2bbccba00a17bb7c2a40b4b44bd20782ec7479f8257ba9fe29d4e55061a74910fdc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\index.txt~RFe57dc46.TMP
Filesize120B
MD5a0f59bfe32d21350ea06b5b1e45b807a
SHA17c5f5d83a109f735ea466ab2076d0ed8ec17844e
SHA25661c1e4dcb587e91d47b47e651b60bc4511eee1698b826708b7fc8674c7a63a17
SHA5123ce4b7c0439c50a59aac24ceba504bae89ac5928fed66f818fea2dae699269127ca0dd5232c934c55de554c288c3027508522522dabf377649f9b466688ad492
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize144B
MD56071fb1d93a98090001fac43accf665d
SHA1c6457f3e81564dc7e128eb72719d2eaf7ba293e5
SHA2565cb337f476bd354d355c47a502467d01ec29a09ab943f56fd35dd21a259f2839
SHA5125e5f88ae7e5fff83a86601c3447e6120883dea0e11acc58e33f133aded36b099fb7bccf209cbac2860e293f255cc4b9eb4246e2fe753a18a819de2208920579d
-
Filesize
99KB
MD53fdcf4fc5e56742462f1a472f8205c91
SHA1bb2662f963385ff5e076820ad3c4eb5a9add53f3
SHA256e3b3822cabfea52e95df38c17cae02567ea3b23bc9e33526bee0c8f658095ab4
SHA512b2a39b92299a931ce853616de75c544b2c72a8d45e45e1d8b0b98d77e56672421dce604c9e79916643eed86070fcbd7fd323147ef81495f34163d44c3624f2f6
-
Filesize
99KB
MD5abcdaab1a0053d649b7991563da9c40f
SHA1191528aefb511d21b5b9da288dde472c6ed0d54e
SHA256281b6737682bca35a5550dcd8a42dbb223fe6cca75c8dbfd778d7e553d8ed85d
SHA5122f5afc49f1fcdc6b31c86c13e20380dc2ddc6a6345230e34ec2d0f805afe19471c6abfb05e13c295a9bc94e1a31311cce26f0e615d91c394bd19a6f51c1a853c