Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 01:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://my.dealersocket.com/emailtrack/track/track?siteId=19&sentId=51150&entityId=607895&emailType=doc&redirectLink=https://summitchristianschool.com/neww/auth/0hefuh%2F%2F%2F%[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://my.dealersocket.com/emailtrack/track/track?siteId=19&sentId=51150&entityId=607895&emailType=doc&redirectLink=https://summitchristianschool.com/neww/auth/0hefuh%2F%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235809112367577" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4056 2016 chrome.exe 87 PID 2016 wrote to memory of 4056 2016 chrome.exe 87 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 4376 2016 chrome.exe 88 PID 2016 wrote to memory of 5008 2016 chrome.exe 89 PID 2016 wrote to memory of 5008 2016 chrome.exe 89 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90 PID 2016 wrote to memory of 4028 2016 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://my.dealersocket.com/emailtrack/track/track?siteId=19&sentId=51150&entityId=607895&emailType=doc&redirectLink=https://summitchristianschool.com/neww/auth/0hefuh%2F%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb89759758,0x7ffb89759768,0x7ffb897597782⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:22⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4976 --field-trial-handle=1812,i,12965641922039285918,15121895947924487923,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD563358f5ef9f4ccd7e19e53e5e177b54d
SHA1921b346b675df68c0d11d0769decca8ff3ed5d22
SHA256ec264d4a00541b915d78ffc49608862114c07d6d431ee3054dec15863bc444b9
SHA512eb989d7eed00c50b480619a9796c67224f3ed97881d2499b540a527af3795ff4b489f03ac87b65c57021bbe2f0f7db9f0b3919fb350dd91c73e2a514ea8fbb3b
-
Filesize
15KB
MD5d5f5bde892f7acea6f6346f1780c3452
SHA17fc1c3462a2bc82697c74b99c6c3688687a62cf5
SHA256acca2ab9a183ec6233cc617bda5619d53faa09e7499ba614b680c26602a2828c
SHA5125a76fdf53858700d8cd9cea9824b2bdbaf3af8f2730cb0a955ab2751acc62df043bd944d51a7e61ed74fc9c8e3320d2142852cdeed026682de0d5ba0c914ef72
-
Filesize
143KB
MD5f8bc8b43330dbbd2c15e795b920534c7
SHA1e41d39776a02c68e403872b8331ca2d30725eab5
SHA256fda3ac58db365e039f420b559d10a34412e5eb899141c97be65545691e61980f
SHA5128d0fb99e4f4db72b3adb4385c4bc90c07c91be5a92018e19d8981bd7116fd8889be2b87268ee1a4a5fd2d588fd3e9d5926c3e4af89f09137f8bcb983c8f5d24e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd