Analysis
-
max time kernel
599s -
max time network
516s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 18:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://classwallet.us9.list-manage.com/track/click?u=c6489a74fc33560b1157d5ce3&id=47f49a5c82&e=efa8f5d611
Resource
win10v2004-20230220-en
General
-
Target
https://classwallet.us9.list-manage.com/track/click?u=c6489a74fc33560b1157d5ce3&id=47f49a5c82&e=efa8f5d611
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246814704025211" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 2184 chrome.exe 2184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 4108 1012 chrome.exe 83 PID 1012 wrote to memory of 4108 1012 chrome.exe 83 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 4128 1012 chrome.exe 84 PID 1012 wrote to memory of 3308 1012 chrome.exe 85 PID 1012 wrote to memory of 3308 1012 chrome.exe 85 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86 PID 1012 wrote to memory of 1952 1012 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://classwallet.us9.list-manage.com/track/click?u=c6489a74fc33560b1157d5ce3&id=47f49a5c82&e=efa8f5d6111⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d0449758,0x7ff9d0449768,0x7ff9d04497782⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:22⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5024 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2848 --field-trial-handle=1796,i,16310512020103996340,8707426325829018065,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD591841140b1245c06c7dcb48dbfafed0a
SHA13f1cf48173121beca2678a3a38c0a08fced84412
SHA256959b7cf79830131636e29ec7bf989ca734cf06f1d6098fd00636634ae111d6c9
SHA512ff141c365708fa980ab768aaeac956e7c89400a5ae13011f7d01cad3e275ae01d5a3fe20abedd2a237c2a2d0dc149a2e5915da2039217cc5c7c5409ba982b008
-
Filesize
6KB
MD5b0c56e4461e3230191bf7dbfdfdc1262
SHA17c7ef6285e5d4e7ed5354673a4479a4bab19294d
SHA2561b656bdc17edc38e611f41480ea04efb3738dc62ab03e629207d0e83686db85e
SHA512d5ba72485f455f837accff3e4eee643b7a3c562e49a65821b0d71a65358d1ad6d1dad16b310fcbb0cdd770085a0098c8a514b4e6b114944105a39187c17116f8
-
Filesize
15KB
MD58fe6769e44931056db63107e44f375e1
SHA166322c24c38bd5f7bba6baf648a29cb20cfa47ff
SHA256e94330fb6776e2b82cd8827a80db852bf59dd0de5fbaea77f86873408e92dbba
SHA5129565380b5517fad58c1746273d8d1a5b68dad1911da28ca2d186e51d93f6eacac6421bd5fc0332690c8d596f1a11a226b6b82a2f059f568218f2c5e90324ab1e
-
Filesize
146KB
MD58b6207ca759f305a6b6e53bc8481ad35
SHA198b53fa0f056099bed2d6c23ec28382fe9ab1921
SHA2561faf44088734aec3a92f62ff9e6ee84a6c83d04f5cb4b135be88aef8206a2462
SHA5124b5928ba35d3683606c262c6e3813e0eed7b009fee20bf11a5db5e02521918780b45f0df37106ee53680fb9ad3226b5339724f890942dc27ae04bbdbb07e9328
-
Filesize
147KB
MD548e75ebe0ff94ede9dc98567e847f833
SHA1b1fbd8f6d8cf084588906438caa14d60a1201e8c
SHA25669bd6fd592a5c0e9c58beeea4da65a96cd3be220dd22d30e074f854592ace094
SHA512eac3b0308876c0fcb088adb7c3f3721b3da4d38e4405e17b81815e53f9db2185eb181ceb45a0910a6e75469c85d1a5170c02081e6c467f1beddeda224782dffc
-
Filesize
72KB
MD5e31a6c6220b8e348c7200c86b82502b1
SHA154e9ada52a3243cf176173bcf92c608e68cff841
SHA2566b13327a3000bfcec05f18b3106bc1f277fb29e922cbdf8fb3c18a6c88a54d1e
SHA5123b7b0f622381386a520912f3e5b2293c862ab10260f34f61c3bf96d8cd83dc7d16318e49ac4e7715f6b7556d9af287cefd1ac6edf18de067ad7c8382f53d1681
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd