Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 03:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://outlook.office365.com/owa/?ItemID=AAkALgAAAAAAHYQDEapmEc2byACqAC%2FEWg0AlQ5IAuymWEioCxdNsNi3HgACIFgUCQAA&exvsurl=1&viewmodel=ReadMessageItem&nativeOutlookCommand=openMessage
Resource
win10v2004-20241007-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133778419557671237" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2060 3920 chrome.exe 83 PID 3920 wrote to memory of 2060 3920 chrome.exe 83 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 2960 3920 chrome.exe 84 PID 3920 wrote to memory of 392 3920 chrome.exe 85 PID 3920 wrote to memory of 392 3920 chrome.exe 85 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86 PID 3920 wrote to memory of 952 3920 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://outlook.office365.com/owa/?ItemID=AAkALgAAAAAAHYQDEapmEc2byACqAC%2FEWg0AlQ5IAuymWEioCxdNsNi3HgACIFgUCQAA&exvsurl=1&viewmodel=ReadMessageItem&nativeOutlookCommand=openMessage1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff1be9cc40,0x7fff1be9cc4c,0x7fff1be9cc582⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2020,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3696,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3284,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5028,i,7210733387978888287,2874927000147184293,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d53cde5fcbd3640c95b8bcd40d6db76a
SHA13078ad0e7918883fe2d9aaab4f9171db45341686
SHA256b16e74d2e2b8971b895b172f6a53503c1c53170f0c6320ea2af570a88046c4ef
SHA5128cac937c1775c4a3a855b8cee9715f96f01dd201988ccedf7e1afd7330986a95f33b15795e63482196724ef317b8011ed96e048db3ec44eba818eaab4ff9805d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD559b64f1cd3744c8faa47936d81d0d083
SHA1a15c7190ff254893e96503916939f6bc859b3301
SHA256d6f4c72c011003a2d099dc1b8b56df7578f705c71dd23c9a3e1c4f5049533b46
SHA512cb89d274dc6224113a7d2670b8046ca798c400b8d739246ae8fe79e00e4bed798a158bb0e480d08b6b7edc1a686adb98bdae9252e7b52f6049bbdb69408349d1
-
Filesize
1KB
MD504997fc0d7c643ece09dd4a3555c56fa
SHA1d1bdb39aad0e6feef7fb57a2e1d931b5daba391f
SHA256bec8d3bc2bbe6b26534512049c461cecb944f4045e9f8b264710579f8635ff1f
SHA512adf5b66f68bd83a9050ec0cae7d50a0e223dbfdc5de45895d9e962caa4f7d1ac7f14f344e4f721ebf9030597c2f5860b5ad1beb2befe49555d293fcce435e211
-
Filesize
9KB
MD5c3e967fd0da0df299d1a41b1b7c57abe
SHA156e56f8fb5e83bd654b316863070ccd49f9260b0
SHA256fe365f6e1e58177df26b17db259286a4ed4279cccd94fe27f772ebce78211e6c
SHA512c0f3461ad3cb5e97227bb615517421bf2245f59310cd53aa541ba50cd9821db8d27331e63ec703c15bb9e76231c25e57884fb01a9dd0a5d0b1bb66e10d829757
-
Filesize
9KB
MD51ebca147ba8af2100814444a95ad3e95
SHA1e79f7621983931ecad834b98a0ed2e67225ba44a
SHA256fd2098a4df4b3a6fe55bf2db9bef66077863407964de2d3a76ab5ca7621feba5
SHA5121b3af834642220ba2f0072320b07f0ec7f5fdd015dbb0a785eef06e3575c5efcd52b1d62f79d287314147cb24410c986b1bcf9387f621a1ea6bf39e00ce45bc3
-
Filesize
116KB
MD54ecc89ec5bb021d4e5b01edbae39189b
SHA1dad70ac722b0984d701a2431ced0a2f3b0e0e856
SHA256bee68ee2ef94a1b5909a7ac2025a9ec6b3c1e7fe2a168bee332eae698d0a837d
SHA512c54e974d021f1c11d8b24308900f5b3fff199785d0bf599c171a40e2c59d7df2ae2e9f1dfe0bd0146f3e78d91a3c556c9c525852522664a65b61ebf1c4f835be