Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 14:53
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766744451674518" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 chrome.exe 116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 3184 116 chrome.exe 83 PID 116 wrote to memory of 3184 116 chrome.exe 83 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 5100 116 chrome.exe 84 PID 116 wrote to memory of 3408 116 chrome.exe 85 PID 116 wrote to memory of 3408 116 chrome.exe 85 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86 PID 116 wrote to memory of 5104 116 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wscmdu.zendesk.com/attachments/token/J5V5QcW7L03e7Qp2MILXQvdvI/?name=Status+Update+%3A+CG6C.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb3157cc40,0x7ffb3157cc4c,0x7ffb3157cc582⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:32⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2084,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4928,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5108,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5236,i,11715691609407502356,15453560362013832871,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52f4612814831cdba506f46254d18af29
SHA10c8d7a885b4bf92c3d987cd5ecc59694b03ee815
SHA256549c93e14a15d7810ade407572efd1a736d70b5091d25569f23056785c624017
SHA51292480917773816653073e74258bc1f12e22d0bed2d8c51705dc31cc6b7e7c75f31d0a31b2aeb510be29ad7dc7e98d670948bb75b1819b08a15845f8d2fa07a07
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5c687a3ee894cd960695b8985635c8469
SHA196396bbb8e1c5482964bcb94707b69f6d26f17a8
SHA25621fba2c29e6c569cecc313f7581c1ac1144407aa10ae91c708cff90ef8d75bac
SHA5122caeed199ba82de1c141fb43f8082734e3cb287e207869170934b2281919f460c8b2f7f773348189513a72aa3de8d4f316570bb8300bb4e35031eeb8f5b29bfc
-
Filesize
9KB
MD52676c4334bfa83215acfc81810355bbf
SHA1d6144258ab81af2bc0ba468a4b86a795af677a47
SHA256b5cf2d75415b1dd0cb843e0f809690bc42704e880fdc96c9616e6ea0bcec2d40
SHA5127a119e9c98a4f0cea379e0f5141dd17e4a702d135451a7572f11cd7e196c2d30747cebea143120c12b4b7b0485440f0a8d1b6ef663627b684e14d91daee98e04
-
Filesize
9KB
MD55db564a680fa2424430b0fa9294bca9f
SHA1f2132a73a48dfb35a61bd5b66ccad5c932989c54
SHA2563f64502522cbe930613d9844df157774714e6e8b1dfc8bd66006dbe264ceadfa
SHA512ca0636eb5a3b02fad30b6c927f08de10fd1f86cd3e262861456c138297cb760950b7423f9e0f4a0035ad950ad1a697197f93bdb3c7b12b41a12e77ba75a5b9b9
-
Filesize
9KB
MD5327c52de8c0ad71a772273078f461ed2
SHA168b2d61afccbe5ce7a04688434e598477f06326b
SHA2562f68a8802ac2fea75f692152d05e4fd79c79d7dca53c62c8c381ccb6f3c27b3b
SHA512ecd2616ff4a32b83fa7c6e29363ea36f45e5ee5f573f6940ba7d72ae4ac7d23007e5d1f3e1f74eecfe13d351c99b78fd1096f17badf50fee9b8292733926c9e4
-
Filesize
9KB
MD5fd43426eaeb334d142d97aec4c5a0c4a
SHA1d38ca851376902717150a6dda252ebf5973fc76b
SHA25616b7b94df1aca51332506a2d52f86c93d02ccf28d60f0688a03d13557992a684
SHA5125c1de85e99acd749dc0c30d97f898cb4bc517e26b1745219a7f5b13831870a2a6342a3fb8968e2e5a901b913cfef0620332a064fbced8f41f58aa30db74bb076
-
Filesize
116KB
MD5499cc8d45976fd21456f9ea06fe655bc
SHA18ae763850d471e2b282783d85f9c1cc74c5b58a5
SHA256a10abfb44437e305dedb1ab8dee458acd305807768fa512994a39d8f11491bf5
SHA51282d531d0bca3e845fbb39277c9aa0d0bec650ec2b0341912285b61f49551b72f33e91cb264268491763f3e92162f1043454983cad1326714b95ae2d505b4873c
-
Filesize
116KB
MD5f367014c596ab81e386ecd7c2158ffb0
SHA1a48076138bfa8d6a12a0f5c4b0bafb69e1109e13
SHA2560f8f3fee6943b494c5505c4fcf28ed69215b0ce0b7366b1992b5e4ecaaeccd3f
SHA5120a0296c1717404445efb966213247057649748e02f7f7628302a707db2b463036ea90cc551c92f24f7b3793aa9e294259237b48e9783069bb120d82e18d70340