Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 21:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aadcdn.msauthimages.net/dbd5a2dd-c8beywzcfmrbwhtr-sqviyjmjs45utzqxzy2scjp6iq/logintenantbranding/0/bannerlogo?ts=636892972373810124
Resource
win10v2004-20241007-en
General
-
Target
https://aadcdn.msauthimages.net/dbd5a2dd-c8beywzcfmrbwhtr-sqviyjmjs45utzqxzy2scjp6iq/logintenantbranding/0/bannerlogo?ts=636892972373810124
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133733291755365274" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe 2020 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 432 3552 chrome.exe 83 PID 3552 wrote to memory of 432 3552 chrome.exe 83 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 4220 3552 chrome.exe 84 PID 3552 wrote to memory of 2400 3552 chrome.exe 85 PID 3552 wrote to memory of 2400 3552 chrome.exe 85 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86 PID 3552 wrote to memory of 4000 3552 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aadcdn.msauthimages.net/dbd5a2dd-c8beywzcfmrbwhtr-sqviyjmjs45utzqxzy2scjp6iq/logintenantbranding/0/bannerlogo?ts=6368929723738101241⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa803bcc40,0x7ffa803bcc4c,0x7ffa803bcc582⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4992,i,16722582196310869420,5642546596162079910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2372
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\bannerlogo2⤵PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56a40dc92c21dd71b5538ee2a583326e2
SHA1d0821be0aa74a6ebb1a5b64845888bb91afdacb5
SHA2569533e1424b0e0e01810cdc7f925d56f6599772107274c037b39feb09171abf31
SHA512221b5845db4ce2d7b10cd6c4c82b62ba6e6c677003c6cc025076ba13d0429ce3d963a8a46e9c7c74af32c18d6534ccfbac6ebdd8cc6b7a33e85b6115d364b326
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD55e0047235e275f314517ef4ce89ebca0
SHA1ddb5c1ab7f89ef28096cc8a3e32cf01bbcd31cb2
SHA2564020469a877893fe34a6b51b85dc39ac5a80a52e5305fa161611a4e9578f8d4b
SHA512c7342c670898ff97a480fa8676d71fc27a30d20cb54856c4bc8b5a1d7724d07733b46d924490d682ccafccef09a05b5fa58c42e46964423891c3804548550c87
-
Filesize
8KB
MD58862f2ddb0118f22cf0b1095115ff1ae
SHA1d4aa65b356fdfcaeb025ed0bf7e9580300674a45
SHA256444899240f03b531a4faaeaaf8b1e4b1e5f57f7eeb9344528603e137be106949
SHA5123af29748204d2759bdd48e19ee75a8cef3db2b2eec484b7d103c3a9e3f12169581ed5ba93daa1c39442a1e21bc5aed88fa5ff19f1fce37a551b0b4c0d9a1d79c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
116KB
MD5cf0c4814c563cb70e76fd6a34fb91e93
SHA1763b67ba528bb1db08891ad3325f4532cbe5896b
SHA25623febd1f61ed33a92d2e61e582e05c7f8b8db381884af0dc04b782a8620769b2
SHA5124dfcb54c50d8f887f98d3404c5e728c63a027d7dc3a2d5de15ea09e0b7524edbfc8979ae0f2370c5758ad621eeafb7ba2416d7c47167428f5442d859cc8c87e2
-
Filesize
116KB
MD519ed0b4cbf338e2c39c3cefd7dac4f5f
SHA156e09eae9d85f5c7854dd5dfbc56803ef4d0c1e8
SHA256604510785ffb190ddec4f6e257b8a75a4437060f00e282e1446cfb82cc92f2ba
SHA5127d3750d909906a6cabd4dc6c72a6e411a996eb6be0aebbd44b935615424634d953e1b4f4375fe36ce37d70d3b8a9c073d0a0a62bfbbac072728ea015e214bb46
-
Filesize
2KB
MD57512463b278325cba457ab72380b75df
SHA1746f0f60970b63beb177d1134fe4e62813ac41a0
SHA256fbf885944ad15cfa81ec2d4534d985d58a89beeb628794318006514156703b5f
SHA512137bdb4ded6f62f300a9705a54983ffe7509b7fa5e3122c440864b8503dd13f394094c07bf5f6b6e75c4d3bc405a9be7d47de1e17b456e999883ef89a2482667