Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://mikasatukasa.pt/////////gmsgc//////axpj5j////YWxmLm1lbGluQHRlY2huaXBmbWMuY29t
Resource
win10v2004-20230220-en
General
-
Target
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://mikasatukasa.pt/////////gmsgc//////axpj5j////YWxmLm1lbGluQHRlY2huaXBmbWMuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244140988484842" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2248 1992 chrome.exe 84 PID 1992 wrote to memory of 2248 1992 chrome.exe 84 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 228 1992 chrome.exe 85 PID 1992 wrote to memory of 116 1992 chrome.exe 86 PID 1992 wrote to memory of 116 1992 chrome.exe 86 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87 PID 1992 wrote to memory of 5108 1992 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https://mikasatukasa.pt/////////gmsgc//////axpj5j////YWxmLm1lbGluQHRlY2huaXBmbWMuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4bdc9758,0x7ffc4bdc9768,0x7ffc4bdc97782⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:22⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3452 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4740 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5164 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5716 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4752 --field-trial-handle=1820,i,16732419647851315402,17276559494705752572,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6204ceae-91cb-45b0-81ee-e2a8fce4065f.tmp
Filesize15KB
MD5279499c38936cd23cdf70cab391b8879
SHA19662b7c37b6f761dba09b9317cf4d118392a9ca4
SHA2568a7fd42d8dce1c7967a21045ffc62e0fadf29e5b82802f8db6a010a5b16fd098
SHA512fb7ee4749486b0e2416792573309daeb50f81c9e4fe4b7496b43e146a0b9f0c6f5650a5d5e0143ff26de40cced34503469e65bc0c5c306ada414c7f9b89f0180
-
Filesize
6KB
MD5bf7e5d8b5ff1ec24d4f4672e6ce0cd11
SHA1a4c0f86accb4e64f0b44a688d26dfe9f430189b1
SHA2563e79726f832812b95d02e2e081b0f5ca3830e9fd6a0a6006027ae3c52282919e
SHA5122b6a0ef6a88abc96aae2ba5ac4866d49955258fb3c26da58ee129a85b7a7acb5e39f2455e181812c474cf00e5b2e8f973f0d2aeddaa8903a6573f070c75eb69b
-
Filesize
144KB
MD5feeb3eef74b5b0bd8357d949b8f93db0
SHA1bcb1b2943aa62532f677d8cf54287c16d0622738
SHA2562a586bf60d8f223750dac2d0641bdefd4e693e7be6e35577b04f9c305b491f72
SHA5121aa9afa863039fe8c012ad11dbba3ed7c0820ecd45d243f9a05740212daf9eb102959100cc724dc9ac1398042530c0ebbf725631cc7af0290b00ecfccb0be47e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd