Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eu-west-1.protection.sophos.com/?d=inliftparts.com&u=aHR0cHM6Ly93d3cuaW5saWZ0cGFydHMuY29tLw==&i=NTM5NWQ5NjdmZDAwZjAzNTEwMDAxNzNl&t=YlQ0ekhDdU8vY1IycXpIUnNtRjNRL3A3TlFDM0Q0ckhRRG1iV3BDVyt4WT0=&h=d7970d2b7d6e4104a605c71ea3cd1e32&s=AVNPUEhUT0NFTkNSWVBUSVbjwWYzLZJjb9JXd6GXkXCp1mL2MksXJF8-_Iyshg_J6g
Resource
win10v2004-20241007-en
General
-
Target
https://eu-west-1.protection.sophos.com/?d=inliftparts.com&u=aHR0cHM6Ly93d3cuaW5saWZ0cGFydHMuY29tLw==&i=NTM5NWQ5NjdmZDAwZjAzNTEwMDAxNzNl&t=YlQ0ekhDdU8vY1IycXpIUnNtRjNRL3A3TlFDM0Q0ckhRRG1iV3BDVyt4WT0=&h=d7970d2b7d6e4104a605c71ea3cd1e32&s=AVNPUEhUT0NFTkNSWVBUSVbjwWYzLZJjb9JXd6GXkXCp1mL2MksXJF8-_Iyshg_J6g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133764973802304144" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2456 2520 chrome.exe 84 PID 2520 wrote to memory of 2456 2520 chrome.exe 84 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 888 2520 chrome.exe 85 PID 2520 wrote to memory of 900 2520 chrome.exe 86 PID 2520 wrote to memory of 900 2520 chrome.exe 86 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87 PID 2520 wrote to memory of 3260 2520 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://eu-west-1.protection.sophos.com/?d=inliftparts.com&u=aHR0cHM6Ly93d3cuaW5saWZ0cGFydHMuY29tLw==&i=NTM5NWQ5NjdmZDAwZjAzNTEwMDAxNzNl&t=YlQ0ekhDdU8vY1IycXpIUnNtRjNRL3A3TlFDM0Q0ckhRRG1iV3BDVyt4WT0=&h=d7970d2b7d6e4104a605c71ea3cd1e32&s=AVNPUEhUT0NFTkNSWVBUSVbjwWYzLZJjb9JXd6GXkXCp1mL2MksXJF8-_Iyshg_J6g1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff0038cc40,0x7fff0038cc4c,0x7fff0038cc582⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4640,i,18123565849214162126,10893047733882976857,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD585a295a7c758dc23e9bec5cb1c832bab
SHA1488277e5ba25940fe028578ac20a2ad00b50a5cd
SHA256ed5fe5cc915bac5ffda13a413381cda7ec2ae8a9f78cdf033af8544a69ee68e9
SHA512cbdc1668848ee6824939de9780a164c7c5261295079a27aa67c3b552d1f79ec7a7383c5c637490a0f521e65035e07150b545b60a1c2b431362cf9c3b12021b62
-
Filesize
168B
MD50520ec77b1d70f030d25b312647e3fec
SHA14c06c8ee362d95024a7553af32cc71fe46b0ffb6
SHA256740d38548a55f03eb52c53c50ef5e7fcdcbb003fec73d5c1e8000b0c8d7d771c
SHA512e300b6979a2132a1290cdbbf9222a67e5da0a2ea40653dce08ff40dac1c1a6e2a30e668d412ec938c0ef72dc327d0368eeb3daa2e260623b0c62ed795abc7009
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD521aa3bc76a8404c77dc2739b9f5b93e3
SHA1eda4fc1af571a09f73c58c4d1045d4fb3cc87469
SHA256180c995337e8cf8d102bac1928fa67aeaf952c9d0001f1f395fbbf7c0a0da017
SHA5127c9d610a173c8a8042a05cb89759d40ae523c61f91cf4637d0b0f494ed7752398d0421ea7e1482574d225d35007879bf93ef644f716e5865686fc0a705882dec
-
Filesize
9KB
MD58dcee8774e2ba1639ea304b3307f0ded
SHA117747681adaa3a1dfabcc5ea8cbf61f604381ada
SHA25623ace5746020a41cee27e4f516390982df5b8964ed210dffee6e7536b2bf2adb
SHA51210c5f3dffd7b9173c2add98b51d8ef80b6a8c5459db59cdf79b0c4b8c61fa917ae8f12588ff957cd37793724adb0223324b5aa50d56daae5d05a425c42fbf36e
-
Filesize
9KB
MD59c5e08109ad97510fda78e4fb7bc0fb5
SHA15a697094958a5b66ecf221334c14ca980bf72fdb
SHA2563af6c0f7d6b5bf88c6f1e3d7691a71f6a3dd5ec32a215b2221eb3cd1dc0ee40d
SHA51296342dd5480df5969654a8c98aba200696191457350fc243a83f10d64666d5fd48033f17e81127b7122b4002963720db6fd09cbc2818e48811c227db877046df
-
Filesize
9KB
MD5a76eb0fc7a4faf177691433757f235f0
SHA1664a24e64d76e39489d456492ec04d5e2b0bf1d8
SHA256aab5696bdca4e9a30f6f76c72b3ec0b53d06a25836e38c8d4b1089f0d33d0e9b
SHA51286f42a79db8caf3ea03304c42a213597bf49f19c706c9c7fbf024daa225960bed55f027730a3b213d83c16619fe147e8f92af1d9af98ec9ea2596d870eff0ec5
-
Filesize
9KB
MD5c1ed55417480e789781994d2ea9f522a
SHA13e2b85985659bc51225eafcc4805d594595f9978
SHA2564e869eaddf2083e63760883c6544e9454edfc3c145edda1089e3abd960366b43
SHA512cc3e4c843653a23daf5ad6ce8529f38bf3e4a802cde7f5175c442283a67de4ce3ff636a6d0d87cbe5903752882359cbf1415c4691c578fc8019bd7d4136ace55
-
Filesize
116KB
MD599ab71deed03daf5236d572798cab567
SHA17651b5f5a927c0ad538754f98d62b49cad02c3dd
SHA25644716c35b53ae01e0742f98c05f9ec58cfd9dda0c15707eb838a31d97268c1d2
SHA512c981d8427ad24dd9de512bd99f8aab936aaa8b218330958daeb4ed846a73f0a78db60e4e324df2a7758a99f15da64df587d3f973d875d582883bac85732daac2
-
Filesize
116KB
MD567f93343c1a8d9dc67acc34cbb2faff8
SHA104cb78c546a81250aed5104f4d0a16b62c28eb30
SHA2568a343c991f93833cd5b9006588d6ec3875ca0df1d0665ae1de819d813504600f
SHA512f28f6d05f3678415bef19e2d1004362cdfa2f55fa136a5ae0520f6773c457aa5d20c8e4fcab34b66e656a648fc9d2c42197f6f66ce94bdba8186c9fb9d61df44