Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 00:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https%3A%2F%2Fnutricorp.pe%2Fnmn%2Fcopy%2Ffzoycy%2F%2F%[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https%3A%2F%2Fnutricorp.pe%2Fnmn%2Fcopy%2Ffzoycy%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133247890881228169" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3960 5012 chrome.exe 83 PID 5012 wrote to memory of 3960 5012 chrome.exe 83 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2028 5012 chrome.exe 84 PID 5012 wrote to memory of 2476 5012 chrome.exe 85 PID 5012 wrote to memory of 2476 5012 chrome.exe 85 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86 PID 5012 wrote to memory of 32 5012 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://links.engage.ticketmaster.com/ctt?m=9313380&r=NDIyNzAzODQ4NDU3S0&b=0&j=MTcwMDUyODA4OAS2&k=Link-0&kx=1&kt=1&kd=https%3A%2F%2Fnutricorp.pe%2Fnmn%2Fcopy%2Ffzoycy%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8669d9758,0x7ff8669d9768,0x7ff8669d97782⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:22⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2920 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4924 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1816,i,721752116902321937,2503957207982462515,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5fa853b14956fe8af76076938bd997e95
SHA111eae110ec639ce566ea4b4bdbefc5d5a812ef1d
SHA2569affc70906db275898b897a90bdd69c36188eb3fa71850a52405cadbbca3cbe3
SHA5126c8baed38fa26882236d419450dd0d27c440bffd30b739c03c61b51b39995ff0b09bf67884968485e4f26ae8cd3a16c19ed46adbec1b6ec3af727ca409a137af
-
Filesize
539B
MD562f707c90ee654fe496457f398e02c03
SHA1699e594b11b033dc1d2023f275bbf412bf0807f8
SHA2568a84634b92ea4cfbcc6066346646ea9c0dbb0b3fe827d1850ccdf317955db59b
SHA5129f14c8ce1cc07b516051b73849d4492d7f33a3bcf71a84096ee8d8e465c9006e62d18860d2637660449161701d17e7b0690e445517eccc33635015d444c49ce0
-
Filesize
6KB
MD5caad8a8b41b13098cdc9b751e97cbc54
SHA1e3e729f6d6f93879037a6164516098a8ad2b8055
SHA2565aebbb65f9b0106d1fdb04c811e15cf5225598360bdd8dec983946734f60e042
SHA51264b48766f973e6f9c90234f6bbebabe2359997dab2079b36f465e88d31287265aecb382739831b60ed815a22f868bab2f73fe32be5c260219bb0c2d2cb50ab3d
-
Filesize
15KB
MD599229fee45161322d7878b06a5846e96
SHA1f2b71cb8a4f50fbf534eaaa186fc5d16c1d105dd
SHA256bdee57a8aaf5aef49bb4217361a8d2710eb0dcbbd829b19ca1dd0a2a83048432
SHA512466afb5f0bcf517f36f257636536e8a637987e683739d511e862f82fdbac7dbd887ecc65d13b9f03b226a49cc28084492763a98b89e6a233c896244c2323bdf2
-
Filesize
173KB
MD55766bb1a642c93080c19aa470587d4b1
SHA19fc4b6a95275cd7a3322fd67d870fea055fe313e
SHA2567fe44f1aefc8991b4a393e1247fed01b62f20425acd78981ae3d8e6cda9ac6a7
SHA512f8bda1b53533c6236ee342147f1f55e69070d97d2bf09b7a7c5e2db16e4e3a377d3c57f4d6a91e48820781a10e51b9e3b6d2dbdadf53fb3e1300f812a2ed7b58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd