Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 16:21

General

  • Target

    https://api-02.moengage.com/v1/emailclick?em=lyndonnewins%40dandllondon.com&user_id=%40%24xy%2A%40%21hæ%18쩚YP¶ã¾5%3FZ‰%3D2éTløÑh%2B%05‹XvA%40s%0Dm&d=%40%24xy%2A%40%21hp5¼c%21åÑx%2Có®SÄû“ä±%03±aw†·Šú%06¿Bú¶&cid=%40%24xy%2A%40%21h„c%03KÃX‚À%2Bto%3B±£%18ô%03%1Ev%19·%16ÙA3fB%04ÌcFÝ%13Ø­-h%17R%24±®4XÀ-ˆrÅ%0E%0B%19bûÃ%0A%1EÈî%1Es%1Aî%5CK%14%3Cæͅük %09%13t-%04ßh.ûxÙ&ut=l&moeclickid=62bd5980cb198e3b43b9a09e_F_T_EM_AB_0_P_0_TIME_2022-06-30+09%3A29%3A22.688685_L_0ecli5&rlink=https://objectstorage.ap-tokyo-1.oraclecloud.com/n/nr4vsmcfdvs4/b/bucket-20230302-2056/o/[email protected]

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://api-02.moengage.com/v1/emailclick?em=lyndonnewins%40dandllondon.com&user_id=%40%24xy%2A%40%21hæ%18쩚YP¶ã¾5%3FZ‰%3D2éTløÑh%2B%05‹XvA%40s%0Dm&d=%40%24xy%2A%40%21hp5¼c%21åÑx%2Có®SÄû“ä±%03±aw†·Šú%06¿Bú¶&cid=%40%24xy%2A%40%21h„c%03KÃX‚À%2Bto%3B±£%18ô%03%1Ev%19·%16ÙA3fB%04ÌcFÝ%13Ø­-h%17R%24±®4XÀ-ˆrÅ%0E%0B%19bûÃ%0A%1EÈî%1Es%1Aî%5CK%14%3Cæͅük %09%13t-%04ßh.ûxÙ&ut=l&moeclickid=62bd5980cb198e3b43b9a09e_F_T_EM_AB_0_P_0_TIME_2022-06-30+09%3A29%3A22.688685_L_0ecli5&rlink=https://objectstorage.ap-tokyo-1.oraclecloud.com/n/nr4vsmcfdvs4/b/bucket-20230302-2056/o/[email protected]
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe4,0xe8,0xb4,0xe0,0xdc,0x7ff81c069758,0x7ff81c069768,0x7ff81c069778
      2⤵
        PID:1432
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:2
        2⤵
          PID:4976
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:8
          2⤵
            PID:1520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:8
            2⤵
              PID:2012
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
              2⤵
                PID:3052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
                2⤵
                  PID:3612
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3820 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
                  2⤵
                    PID:576
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4428 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
                    2⤵
                      PID:3920
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3404 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
                      2⤵
                        PID:1344
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3832 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:1
                        2⤵
                          PID:4908
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5248 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:8
                          2⤵
                            PID:3104
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:8
                            2⤵
                              PID:3920
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:8
                              2⤵
                                PID:1536
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 --field-trial-handle=1828,i,10478088877989268108,1862339003878009984,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3460
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4132

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7b6fa37c-17a1-4b75-9711-8e731cd08c2c.tmp

                                Filesize

                                15KB

                                MD5

                                b14a12a015c8f36f5f192c129636136d

                                SHA1

                                2bde3886daed5b6912250ee1c1dcac3de793c43b

                                SHA256

                                ab7f55a6e55318a3e9dce045a73d51fe67009fbec40396665660c46cba7a49a8

                                SHA512

                                04af9d59fe4affde5837720eddc56eed8fd70f64c3e148961be9a2f498739f5f256769b6c51e6a8f3761d09411584c5101f14fae05d2015a332e0f7a585bcac4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                216B

                                MD5

                                492a58d98756d6c77f74fe723b7a751b

                                SHA1

                                463bc2bda350864318dcba2a096f955c38676d38

                                SHA256

                                32d76bdf56ef58881623b8fc7f32c14e7ab487ff37071f2531c955f0408cf4d9

                                SHA512

                                075ad7c10f679c47a6f7fef2a1be5b6f05bd8e3ae611cdfca11d5490d3e1ccfd635bab7f37ee2bb32552928e1af4dcee6b3cab45a4939c40eab763eb493a6093

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                ae1a72f725529b15cdfb0a61d753ccbe

                                SHA1

                                f37d8f65a415998c6d46cc34d0d58ae2183e721e

                                SHA256

                                c518ef4c7d8ad9b914d1fb56f2c0eb6f5af33c4b3236bb1d70f77cb96edac4a7

                                SHA512

                                70d8b2be61cbacef6ef3a8e8161bfe1c074f31c0a8e84c52a40c7cbbe4b685677d720c256135200f7d9233dd36df7648f4e56ec79050768210f4aeec35350725

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                92cb1525f42a77c7ac538bd0dd1c22e3

                                SHA1

                                f0864b9046e8458ed01d51dce32dee5f0c54c3bb

                                SHA256

                                079fc204c57f40d88ac3f287ae361274300b3f88bb7b79663f52f578949e59ea

                                SHA512

                                2db3b83697c463370d79aab2e009b516eb9a85f869840ee508b8f1161ba2688320f6e6fbb406dca3bf1c94b745818024ecb3d8b52482f7c488029d79d68f3ee5

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                280c4a5b6af5839e4bf3b7fa8dec1e7b

                                SHA1

                                bd2ce68b037bfabce8e91d202ecb16c9fccaa466

                                SHA256

                                5e905ef32ce76ab78086c23e17c1e2b92f23d413720b77f72827038de529386d

                                SHA512

                                ab715851a8f1903783d5386baa4d4bde08440224c75f06b343f330dfceeb727a208e6d9494c24868333cf19a1f3cea73b1d5ad13fabf6e86f7dd001148d38665

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                a67be4e315e55354469946eedf2317c7

                                SHA1

                                bb7fc052126b873e5f8525c3922b75d8e08e0201

                                SHA256

                                f47215079ae75122e9001c6ea9da2c198c7b372c61e62d976131db1ab236d905

                                SHA512

                                b00b39f5fccdc42602ce52d13a5b494d4edf7dc01fd3ab0646d1c3ced66280eb97ad67424f7b497d356c09371ac3d32b0227d0fcffc135523a6fd629bfc2c1c1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                fd2e53ca6160b5f0b98622f94c4d778e

                                SHA1

                                08236c42e12d92d8fe0e6faf4fb8ef9ca031d162

                                SHA256

                                4efd5b60ef2be760173b662188fae95295f5763b3e5327a11cdf8c04b337e37e

                                SHA512

                                76a57d2007609dd7ed30d870b6bd2abff7307ef21b2b066ea7c734097bb1844e216e0acebe19d6a6a5f373d0a6678a6d54b3e109f67a6207ea40f8f24ee2428b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                a0867162eb0575375f41248dd5ae5aeb

                                SHA1

                                f9d43136e68ef109005b9e7cbc78bbd7236c140b

                                SHA256

                                0d1f4d9035adf107362814011ce5fe95ee031874e8a2dce04225b72390c8cceb

                                SHA512

                                c46e4b3f5bf54bc097eab1f3e4fe027e12e6e7b5235609c1d2ab56215d258ee47376d4461ab3512c1df5ee1f832233486398fc13003f33a5b31dfa679b6caaae

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                603118808297478cee7eb33157929d9d

                                SHA1

                                a4145cdbdd8d8a468798f8871e1068539f0c6719

                                SHA256

                                2b256436210da8ad74bf718ebe0735ef3619de404647db6c1677c30a9dbea810

                                SHA512

                                a460d36c68594b9dd3299aa58c9e3ccb2e0cbe48d82f3b299d9d5a44cfa3657eaa2ce53eb804b6fffad5a70c1e8aa861510380d1c7ce5fe1efc7cbeb0f56de34

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                143KB

                                MD5

                                40fb6c049c154b5f79f04bf3817b8980

                                SHA1

                                557b04d93e379f2050964f3e4f9ecca1b2582ed8

                                SHA256

                                19a2d28d6ec390e1135dffca46daeb531453705d297e8e826f3a7d9e13655653

                                SHA512

                                6e2fd3e412cc2f1fa321df25d27c49923aefdce3d8c9e856861fe041f31b91bac0923bd6aa8969ae2f8ea7adc9a7d29506acaff7dd3a82c6d977b7b7ffb42261

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • memory/3104-212-0x00007FF839DE0000-0x00007FF839DE1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3104-211-0x00007FF83A2E0000-0x00007FF83A2E1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-309-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-308-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-310-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-315-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-314-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-316-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-318-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-317-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-320-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3460-319-0x0000022324210000-0x0000022324211000-memory.dmp

                                Filesize

                                4KB

                              • memory/4976-136-0x00007FF839690000-0x00007FF839691000-memory.dmp

                                Filesize

                                4KB