Analysis
-
max time kernel
60s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:59
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docoffis36500356.twitbusiness.com/HFLoU/[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://docoffis36500356.twitbusiness.com/HFLoU/[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766567641804638" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 548 chrome.exe 548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 548 wrote to memory of 4484 548 chrome.exe chrome.exe PID 548 wrote to memory of 4484 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 2928 548 chrome.exe chrome.exe PID 548 wrote to memory of 1244 548 chrome.exe chrome.exe PID 548 wrote to memory of 1244 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe PID 548 wrote to memory of 2620 548 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docoffis36500356.twitbusiness.com/HFLoU/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff97a07cc40,0x7ff97a07cc4c,0x7ff97a07cc582⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3852,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3996,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5316,i,14173938639010275233,9967832987994997762,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD516c109b0960487087edaf59546f7c993
SHA17eb4437547149c4bc7bf4b7d0d3bd509f257067f
SHA256950cf6d56ed30ebd253b0ea4133fdc940ccc946ffdf79a6fd2ec0a47c84803d2
SHA512ea9f6eccdd3edf12ec518c397d88f370f54b4d7e90b28e1062b4e614846bd9b8aea09721a168ba437a0c3c7f1b934690d5ddc3d5e0e5400583c2e827d1de3746
-
Filesize
288B
MD518ed2a9d1e3ace9fd8457f8866d973c1
SHA1abfe3a72d126416fccf253e50d286d3583886393
SHA256274ad66cec229ebd112b487046151ae6639ed79dda968428956d2b0b54fad2a2
SHA512415022a601335b0ea878c465b705222ef594778ffc34ad32e00816869e4bdebfb3640511ae8c6dbd986a359654541001c8747b9f3726b44b15bdd79683a91a20
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
852B
MD576ecd40893f46a1b9265514fee06ff91
SHA12f09bc1225ab90753b99e5ecc8566d04857ccc11
SHA2568c24624139a8474499c54033cab4ac09b67b7f44a86949c16b9ba940dbe4b42a
SHA51279d40e8b910cdce821f9a738455699ed90420db8e7b5e157417f05d1486a89fba1d6f13582edc2201c736208abb62d84bc99909e5ea9186b4a4759f862ab7f05
-
Filesize
9KB
MD562baec683206c0ac0643478f3bd76a2f
SHA1f7097c95aa759e7109e3a998485e2fb6e6a5752c
SHA25686c1130554766ee4f6b545be2864d80c68792cb15e2710554d4f8e9b932c388e
SHA5128eb95749779d375c1ed3ca5ecaff7bfe8a05b1e13cbf63eba84529b7ab3863bbf947e415ae482688eb770b8c023c681b5fff2e1cdfd9ed322b70e3519aeb5bf1
-
Filesize
9KB
MD5df28ad57f731a09cc0df8f8c86b9f24c
SHA1a96d7bb9fc9285b35b2c7baeec70dd75e279fe54
SHA2569e2304f8356e9189ba7df600103725c6a33195b770adf523765bcad57a391432
SHA512c0181b786ae8612b63db4db2d10faaa304bfa87fb4feb6585d252a8c6cc6d24d632b1b0fc046aebae93a8d9e94bd04a6f28e46e162e07509bf6f9641338dcb8d
-
Filesize
9KB
MD58f280bd28cfcaba2d370e297cf43e5aa
SHA165441a3e0cd38d4c137ff7bd2fba75a97fb4221b
SHA256ced92279389324e55e85e2cf9ac08fa04a85feeb99616a2276eff29a83865f96
SHA5128c5b065d3196471d5037e6d49959024dc0cfcfdc4afd48b33fae03392e056875e0c650b18a098b578e7b68f080531371a987b41048fadb66b3856c39e742d672
-
Filesize
9KB
MD526a8f9e8096d7786476c4bea6f3faacf
SHA1879531789886fbb55bb31ee3d0f806a96225947b
SHA25642ba575b28661e44357151c43508719a8bd098a716920ed08da017b4e78fe771
SHA512984c199992b30d0d973075b0d18bb5d69fa475a0f99cb100007a7df8e77c885abb4d02acf15614062d017dcddfeda90b7adddb49b6ad3991d5c3cdbc0411ba9d
-
Filesize
116KB
MD58e6559e2ce5a94f9370878a3d7ec691b
SHA1f0ad50b149afaf5da35d49ba024bd42b4e6f8a51
SHA256bc59f28f535170a19cbefbb53ecfdddc3655bfb9ef95c3eb55ef772cc3dc1c9d
SHA5129f42f924e5370736deeb0a7fe32ae3dd471e3e0218a5c3e034c719de048023ebcf8a44816c2cfa374f08302b548d3c7f7db6487711473765f05d091fef93cf89
-
Filesize
116KB
MD5eaa1691b33d53c8e5b596b81b0626154
SHA120398e5364b8592686a02ce5f333397583f102de
SHA2561b6c9b78d0c77ac9364f8e3648d6236471777ca209f8db96a755acc05fc3dd44
SHA51228f6001fb23b48e4e505fc01c4d80a7a9e16554e260243aae4ccc31f3d72feb125cbbb87a8e394cfbbb9ceff6315f60e7692245d2a9ff46438bc0c98f97543cd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e