Analysis
-
max time kernel
67s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:41
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bolgerapps.com/limeade/[email protected]&blastID=4160&link=https%3A%2F%2Fwww.hca.wa.gov%2Fassets%2Fpebb%2F66-0024-SEBB-reward-yourself-flyer.pdf
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
https://www.bolgerapps.com/limeade/[email protected]&blastID=4160&link=https%3A%2F%2Fwww.hca.wa.gov%2Fassets%2Fpebb%2F66-0024-SEBB-reward-yourself-flyer.pdf
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
chrome.exedescription pid process target process PID 3580 wrote to memory of 4572 3580 chrome.exe chrome.exe PID 3580 wrote to memory of 4572 3580 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.bolgerapps.com/limeade/[email protected]&blastID=4160&link=https%3A%2F%2Fwww.hca.wa.gov%2Fassets%2Fpebb%2F66-0024-SEBB-reward-yourself-flyer.pdf1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc43934f50,0x7ffc43934f60,0x7ffc43934f702⤵PID:4572