Analysis
-
max time kernel
57s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-12-2024 16:01
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 20 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784929482896123" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5548 chrome.exe 5548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe Token: SeShutdownPrivilege 5548 chrome.exe Token: SeCreatePagefilePrivilege 5548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe 5548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5548 wrote to memory of 5152 5548 chrome.exe 77 PID 5548 wrote to memory of 5152 5548 chrome.exe 77 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 1728 5548 chrome.exe 78 PID 5548 wrote to memory of 948 5548 chrome.exe 79 PID 5548 wrote to memory of 948 5548 chrome.exe 79 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80 PID 5548 wrote to memory of 5552 5548 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://attractivewebsolutions.com/bmw1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf6b8cc40,0x7ffaf6b8cc4c,0x7ffaf6b8cc582⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1944,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2136,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:5552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2996,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4264,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4272,i,5402318391431669791,7052196645753074037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3012 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a8fcbfdb3a832fbce4834e42d31ffad7
SHA1daa04d1d1675e73f1249fa85bfc09efecc5428d0
SHA256e046eb63a9a534a5ee9190006399901de1b778bfb7aac58201b242736d099b44
SHA5127476b118073bc9348ea040963e0a083fd2f6d04dcf040828b93b200b47094d9647674bbdebcba3e0b269e002a1ed8ff7fc08fca9e2094bc871d660e70b7b6c82
-
Filesize
240B
MD5dd9eb034dee18b9b44cdbbcff2030f54
SHA1611c3c5ce5acd103a6414cd83726a1c05862dd5d
SHA25679d1bdcbe56587506bd8a60cb0dac6f0565e55e104b626badc7ee2194f5e5fe7
SHA512ea132e978002acef1ca4221df58e481316def341b1a1d1b3420f9742c3968b0f39dadb68cbbaac46c140a1d1ce5a587625d83367365f8ba4afb2224c01ad2dc3
-
Filesize
120B
MD58838a9fc691f71e51c5661e81669ce28
SHA14d74e033e3deb5098558bd842d693c25825c19f7
SHA256e62313021244a5d94fc44465226c6a6ce43d5899b6ae905e38bba63de4113dde
SHA512cc114ef8da0299db8d752587faf0b21acb06154d91347f0b51d881c568de03f47c2e478622b58aff23b797d4bb7ae9cfea723f6f94f44d0d9257b55638247f6a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5900dc4f58ae5c913078f6b787170a737
SHA129dd0737eea3e501cd39174823ec3e92dba0f04a
SHA256a5082c5059c24073bd51279b3ba46175ab78967ead74c37f1574fdaff8419704
SHA51246b4293802bc8f8527b2801db825954e6eeffb73cfea243717f8ccdeaa2a4e068f06f6e55f0c66d40a9bd53ada5ecd75e051ea067df7f436d97f1c69e1b3e12e
-
Filesize
686B
MD5f162b99bb33273d484879f83f1a0c460
SHA1a460df11cc1aba40096a191a63e51284931a7d58
SHA256348ff05faa38ca89badb70b81d325c74a0aad23de5edfd20203adef933de5fba
SHA5121825cff09d6b8d2d78f9d27f5b1a0a9cda66c4207ca6b6c7ca91390ffcc770ad892e3b2dbf5bd5920f83b6290e4cb7459e6a3daf0324bed53677b3bf6d3e4b17
-
Filesize
9KB
MD5bc42f7a5c8400b6a0e73682e2699c46f
SHA156f56c83847e8a73ec1cc0127df79b2b0edfe946
SHA256eeef81738c9722121ce81778061bcff579aa401a011d2a7a28c0fbad17b5e21f
SHA512bfe15f9623fb8d6e97bada2804603b42e0893576229f3ad9b11c533c8a3128c1ec61dc1c0aa8972d6f682ab733d420bf8c7f3f108d1c9fec971c33554a81c9a1
-
Filesize
9KB
MD5536f68dc7ef12464d7fb4b11a54f41e2
SHA1c461ab176406d4d3dc486025ed6d45c8150364bc
SHA2568e7b8ed6a2e161ac47c933c6ccb02ee2883d7790d8af6739841caebd85c298c9
SHA512677d79a5c681c9fd9de329e08c6823f0e5fdae7e42b727e43c109336203fb5df30a970d390c21624aab3dc6bd1eba4db917ad8f30b7354c2940684c1c6e27227
-
Filesize
10KB
MD5345102d7bbf8944557bdfa03931e7718
SHA1e837fb91128912137dffedb2884cc98ffceca886
SHA256fe70692e6b67dada92c5dab57aa65c6aa18f54b289864e934904e904896678b6
SHA512f9fddf52194084843dc9ac28709101b98a88921f319f50b77f4b7f6a8d2f3f547f85ad1d2a37180711e117b7e73e0177eea52b13e7e820f2eaaee07d961c969a
-
Filesize
10KB
MD51ea60339480112ec5289acc458af4e19
SHA1641a7ae7033e24901b2f17722b1252b909190140
SHA2568e9e1476417901b9ec1daa7826fb592de72a21e413d5e7c18e7a892e88d2d134
SHA51226391272f14e12f80e0b8abc09a6b7f965d20beb53b6be084174b860b708d682e20dce4f8683883a7828c349f2f94af59eb2d049ae91efd74dbd9c1bb19aa17b
-
Filesize
228KB
MD5cdce793ec7ad7f71065704c0cb109bb8
SHA17c1c90f4c7e473773a6fc6f5ffbfa9c7d292519f
SHA256319bff4053c0fbde9a69ab66b17ede2447bc9549784e16eabfbb397c9b979ddf
SHA512810fa018b45c73aa72887866c57744d07263695632778e9790850282c45d4f91247d5a0651cd71f4db93b8965f37d7a2965532a3033bca9f393b3aa4df292605
-
Filesize
228KB
MD597cf91a49564f2796ef912a7a8f144a5
SHA1f879555c6ca39f3f2a7015aaa999e03cf257b342
SHA256f373b201e7745cfee6e1468f1bde95088c661e0229fcc3bf9ed4a25ca434b938
SHA51222f799ea311f05e1dc929d7ed682d4807c02665f371328e0abc2a9a6ef7e3bcaef937f3dd5c9bf532673cced5c8010b96747f0377bb0647a5fa3329ba0b46fd2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84