Analysis
-
max time kernel
28s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 19:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clickermediainc.com/cwy1c
Resource
win10v2004-20230220-en
General
-
Target
https://clickermediainc.com/cwy1c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240770313919772" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4340 4432 chrome.exe 85 PID 4432 wrote to memory of 4340 4432 chrome.exe 85 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 4052 4432 chrome.exe 86 PID 4432 wrote to memory of 220 4432 chrome.exe 87 PID 4432 wrote to memory of 220 4432 chrome.exe 87 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88 PID 4432 wrote to memory of 1672 4432 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://clickermediainc.com/cwy1c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa25b59758,0x7ffa25b59768,0x7ffa25b597782⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:22⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4792 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5060 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5096 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3456 --field-trial-handle=1820,i,15236176483961053249,13010326337880158954,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD53713b09ccfb1a8ec48e01d8ab44dd08a
SHA14f8b5b2126f51842cfd73425b5598f34567cfe30
SHA2564e0c1bea9757414e169394590e9ca2ae8c4b760c21d3edae2c65274b0cd670f8
SHA512a45477cf9007774d56b3669460a10454f20ae96507d37da0c9b9ed8a1de17ebef10c213e839e4f8efb4d5abfcdaafb271e8f7c4df7369e4b7f663df1423963be
-
Filesize
6KB
MD5a9052228209d3beb081223d68d87e5b1
SHA18bab4aefd4ce5e4b15c0a1aeee757d78fbbf25f2
SHA256a656d4ad8dcb1308b859b8c55ac23d3e0d36cda80afdd17089a7750eab603a0b
SHA5127aed045e122f86081cc15035aa19d8cdba73eaee1d9b346631c9d90c515e5307a34d4e9b6dc0186a381a5317052f21fca0d5fd04e697066410d3f07ee7493d3b
-
Filesize
15KB
MD58c289197252706732ccc69d978fbccd1
SHA1dcb3f43c895e80498de5556f0e20fed2c254d65f
SHA256a9cead0c540f6c22762082bed5357c60cd9006ed2132a0a8045fca6aa544ac01
SHA51219676cc1fe843a551283f4b0cbaf34d2a123fd2fdca9f2ac5b6b3ad1a7ce0c477ce5ee7fd0edfc04a291ef899516ece907f15dd637555341f8dec17170d171ef
-
Filesize
145KB
MD593db45e8f0819abe363194bc2224239e
SHA1c0897be2f4ae5b9aca7467fdb3eadaca2ee41bcd
SHA256aa8f316a5b7486af9915c01669d3efff6bc94922d75c8f3ae1f1b06b31c5f600
SHA5120f830f98433cfd9451e0f6218dc7cea37767bb2a2893b083691afdab27032f0a9fb2dc4a1675ef33f1384dd63c6e86c7f407bf5e3648e218bf08faf2b9e3e0db
-
Filesize
145KB
MD5532a2f45758fcbfc24291ac2838547cd
SHA179b0db3dd30eede08e97eaa497348d8b7f1eb52f
SHA256c12e5f67a1f6ac19839fc9b20f3726f07239da77c10aeee538a417bdd8057aa7
SHA5121181fb44a9f958153b11ae7007b3b8c4262ecc8a46ac32c33815f764e5959f074e1be8c1264830b668b4828e395e8eee6912f57900dbfcdebe183fe4e131d450
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd