Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 16:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://0416c34.netsolhost.com/microsoft-outlook/app/
Resource
win10v2004-20241007-en
General
-
Target
https://0416c34.netsolhost.com/microsoft-outlook/app/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133781501892554890" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4196 chrome.exe 4196 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4196 chrome.exe 4196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe Token: SeShutdownPrivilege 4196 chrome.exe Token: SeCreatePagefilePrivilege 4196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe 4196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 1180 4196 chrome.exe 83 PID 4196 wrote to memory of 1180 4196 chrome.exe 83 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4744 4196 chrome.exe 84 PID 4196 wrote to memory of 4896 4196 chrome.exe 85 PID 4196 wrote to memory of 4896 4196 chrome.exe 85 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86 PID 4196 wrote to memory of 4240 4196 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://0416c34.netsolhost.com/microsoft-outlook/app/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe649ecc40,0x7ffe649ecc4c,0x7ffe649ecc582⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3672,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4788,i,13279011524704827715,10558852047016677080,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5499df874153ed942a3d2f69ef92c59bc
SHA1d0bdc73eb56d8abca50c125ec606f70b902c407d
SHA256854fa2803707a34091f33bfc2d2ed61ffaf9c38a0d6027cb73319329b3fcd900
SHA51256b2ccb9c41d79ff179911a470529864728551df76f7891133dcddad7529481af8b70091f99e46663293e1c8f95eefd2d4f81260e5748a9dd1209a92b6fb4f64
-
Filesize
1KB
MD59c85f0ff91856c427e6906c3395c6fac
SHA1f95060a7183796e6f8322b5dd4277dbd17e3f185
SHA256c0f6eaba55d3bc0c9574f9097d2f51696a5dc1b302b3b3e638becc0bcf784b32
SHA51228c4dcbdc86efa4464107d12a69b35c55cd159213e4cb6969e8c9cbff8f14414c77e04aae24697505193fa629035752e1d0fbc2b1ac9751a7b683c6a518bef2b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD59beebef80773c0b9eab6dcb1ecc279fa
SHA1b24bcbf4e203b97417816bc8136bacb8b7477513
SHA2568f5d7c8320aabbf7d1ad05ffb2e2a609a0f22081d7b6ec6429e5d497c49c2d08
SHA512c28b55d27870ef220a960befe71b21396a80a7c9e0f76beb23aaca7094241fd2bc8fe534c82d72e9b80bcb10297bc70fee0ddc27d923b17fef58cbfd96296bf3
-
Filesize
9KB
MD5c21139239b187773af2df7b4b6fb5d02
SHA1273e990c8cc16741e95a027960d9d7599da0242e
SHA25643822571488205e8684121ea74e439ca546fdca97cd70aaff9278d39b454207b
SHA51205500db69e9032d9d231579532766ff8eb08e253264bccbf52071bf0b1b225b2bb83550b4a21c16f420f2f23f62cff50b983e73bf865bb35db74314defc7b438
-
Filesize
9KB
MD59f3e6ca8b0f240d5357cd484cfdff1a2
SHA132e394759601d6ece503f8c9f9bbf274bacb4275
SHA25695bca61fa9aae4d4c395791076821a23ad02634ee36d2ef22a3c9222e2220877
SHA512f392fd3a01d5876b9122d6f46133d47dcd690f7b083653be585be287e03cf94c9adfff0ae3cc7ddc3501f9128223ed6152b6b19908b5c4363a191002b80259b0
-
Filesize
9KB
MD531d075873532161833c69da54a0747fd
SHA1418c5efed22b6238c61d21161b9ed242eedc6d90
SHA256072665f0ab73859c3fb857a60f2433a8eaa7b2e9ae8ee1011271d52db11254c1
SHA51207594d7833edcb890cce341265639efca0cabbd9d4f4fc00b1c6e73e203204f4aefec10de48330a6611c9bd4ff652d14604b7b2947521dce439a26210f86e4d8
-
Filesize
9KB
MD5fdd85fa29bb9aa0f4566c6c41fc5f320
SHA1dd5de6f781af09cb2f3b40f4f7bdccafc87da90f
SHA256078499e5a048b1205a7592eac24f481c8f8212dc77635ab0f95742d9818a2079
SHA512b58abde96c895d5530544d4c05f80ab30e92c8f500b861dfcf7e9793f848808d225e25258f3fd5b3f8641ea2b4c05db0d29c241475e7b56e58cbe23e4bcf54b8
-
Filesize
9KB
MD50cf69ed3ab7ed9e425558b91ace727c2
SHA19ce2636ef5c2845ff661cbe3289be123479136f6
SHA256bce94c5c5eb54452517bd3b0af41e5f03a4d17d3788836703c736ee4ad7cebe4
SHA512bf22c88dace848d5805666301b2e3bb24eba0eb3a06317257399df4a6a7959817aae8e98e0cf14413fcb0e8fbc0b3af113f7996033f7a8a6e6d22fe699fe24cf
-
Filesize
116KB
MD508234b88b5703696056d4d750faffe3a
SHA19e86824d6cc79ba89db0c7f48b5119a8dde912be
SHA2565b80e43422c675c715d3bc33f5d0dd6b298bcd323f7f686523cbdee05a4f122b
SHA51200ed3f210a06e5d4205c329d5361b7893a5abc0c594b8c17fe8e7b30d75fc52012a3c39c930b20dcbfed29f1cc6b7a6d5350b1ff4af1a2cdaddd5cffb2d5bfe6
-
Filesize
116KB
MD57c494c15158f90ab8bfc2b934e9b38f6
SHA1b95504b4f23034fee5ad5990c5ea966e9a6212ae
SHA2563b0839f7ee529afd49efc9232a055ebbdb8d0286bd6f8209fe7573c0d3e948d9
SHA512d48f1d43a69ad43e5b9c94789fdca1af333084c7cd40e3dab139ccaf3ff6221f565c94d0566d54f2942564699a54827959606dfd2499f80ba3c281a98a5c3cf4