Analysis
-
max time kernel
21s -
max time network
23s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-12-2024 18:57
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 32 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133791082526474900" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4432 2872 chrome.exe 78 PID 2872 wrote to memory of 4432 2872 chrome.exe 78 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 3276 2872 chrome.exe 79 PID 2872 wrote to memory of 1140 2872 chrome.exe 80 PID 2872 wrote to memory of 1140 2872 chrome.exe 80 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81 PID 2872 wrote to memory of 2524 2872 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://vszp101.s3.us-east-1.amazonaws.com/index.html#ZUNvbW1EaXJlY3QuaGVscEB0ZGNqLnN0YXRlLnR4LnVz1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa41d5cc40,0x7ffa41d5cc4c,0x7ffa41d5cc582⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1708,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=300 /prefetch:22⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2164 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3088,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,2658185638085971488,11277254068777391337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5eea2957ebf78aac9d41fda359b4de0f7
SHA17da36a5f5bee5853ceee0e0a57c86468c8ecbc0d
SHA256f7d06a9589bc36eea3b43c3ed1378d78257dd4b4609c2524ca02b375f814a8bc
SHA512f1437bd3e855d15502629180500385c47a818299770520071716d00510f9122aad0b0395d0b4a46dc39e4286aeaf2a787f364ca917747eceba1cbb2555656f9f
-
Filesize
9KB
MD5aec74e362ced33574c009f878f90dba6
SHA1cb5e6dae8da6affa2ddaea78563080e079be0c00
SHA256ef3859398e68a2faed8fb3b62361a41f15eb072f30fa3332323032c0de6a0ca1
SHA5125a904500573d287588c01f74220fc14a4c7571faadc0af599f94bf987e1400bf2a281cb692a1ca3d10595dea476a05a4a953e8b7edf76fe87430a260fd7797d2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\fa24a811-b9b2-411f-8002-47281742f1b5.tmp
Filesize649B
MD5a9b1c1ccd02e97fef84abd1da593e158
SHA19d47bf11df373a0e221b94bc441eeb706916e97c
SHA256ed24051da971811b1718f5da8b01b484907875b90c40c7065f13dea6c980e602
SHA512fe958424994e3bf345ca569a276a594485d50e5898452129a8af11671077668af252c06097ecc6f9faedc63e3b949ae85717a7d149e59cfd47d91f213703862d
-
Filesize
118KB
MD596812ed4edc456b383135fd8526d36b9
SHA1a69cee0ce2d689982985cc670afde3b80463e1b9
SHA2568fff10b65720cbb1577dbc006938447614877dea44bb4df3e8866460527c9927
SHA5125268d6e4e762e1c1cd87b7d0ca7319bda77904db0306d3ec1343cfe12d17449427a4dcea612bffe8ee43242338b911a6cb02795a28dc0495d6919dfc8d50ddf8