Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://primepointtrading.com/.fr/t/4/c3Jvd2VAYm9tZ2FyLmNvbQ==
Resource
win10v2004-20230220-en
General
-
Target
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://primepointtrading.com/.fr/t/4/c3Jvd2VAYm9tZ2FyLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241421682688060" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 64 chrome.exe 64 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeCreatePagefilePrivilege 2564 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4124 2564 chrome.exe 88 PID 2564 wrote to memory of 4124 2564 chrome.exe 88 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 2212 2564 chrome.exe 89 PID 2564 wrote to memory of 4008 2564 chrome.exe 90 PID 2564 wrote to memory of 4008 2564 chrome.exe 90 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91 PID 2564 wrote to memory of 1696 2564 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://primepointtrading.com/.fr/t/4/c3Jvd2VAYm9tZ2FyLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f0909758,0x7ff8f0909768,0x7ff8f09097782⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3876 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:12⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:82⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 --field-trial-handle=1812,i,11863867826657891502,8299043752950183534,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bd20d293061d9b318ed76ab57716ea87
SHA10fe529b1d64ddf0c11b585f7780705bc8e57aef1
SHA2566f176d15e73924b33c074a2a0bd8a414b97f04e2b18154a69c033a1091e6bc5e
SHA5124a88ab66b46e8367630719fb6ee021d10fccc7ab9c1be1f5c198116edd97199c97d5737199764ada967396cc4870c65c1f53b84a57ac9f1b847f8a64acd1eecb
-
Filesize
6KB
MD5899fcc420e7d02a0604fd129b3a3ac82
SHA13b5d71a335884c7a9791cacfac599d61bce627f9
SHA256627706d11b79eb17ce5763cab7011501048a2cc0c3f76a0341455c6ba8417727
SHA512b3ccf53094a335ec8113131a8602bb20c3a764680fe625ac807bc6988ec189388b4c34fa8d0ddbce64ae9804e19c713d6433dd0ea7d1b26409e87461ea9e597e
-
Filesize
15KB
MD5450887b47d661253d27af1c1fd386600
SHA1967a7b97ffe7086997b39dc85984a00c28fb3d81
SHA256288ddf76066ba5d61664f7a972d56714bc0db616da957e868db509049f6d219f
SHA512b4e78a29d788d796df5f47a5f148d144121f332d0ef5a65b4c835cfda16c357e0bfac9b82af9f261ab72c2e556e97e6d0c59e48284c9927efd64f99bee1b2710
-
Filesize
144KB
MD5ccc071fc6d827c2ac2609d4b3cfff82f
SHA1d2a715c90d8d4641ca4a2450a85d8104b6fbde37
SHA25690a552e24cf48c5b21d56ace3fab24db31b9389e7905ae8f27407817d1d44454
SHA5121899c09ff45e128d8d40b319e74263b4baf8eb4de25670ffd4bb26686cdcfab0c5d5231719c614f7f55c1387a9138a77f8cc3df181cad352eb3c7c4c55eff79b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd