Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 15:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mahrea.clickfunnels.com/optinggdl8m3z
Resource
win10v2004-20230220-en
General
-
Target
https://mahrea.clickfunnels.com/optinggdl8m3z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250168181393136" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe Token: SeShutdownPrivilege 3228 chrome.exe Token: SeCreatePagefilePrivilege 3228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2208 3228 chrome.exe 83 PID 3228 wrote to memory of 2208 3228 chrome.exe 83 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 4272 3228 chrome.exe 84 PID 3228 wrote to memory of 5056 3228 chrome.exe 85 PID 3228 wrote to memory of 5056 3228 chrome.exe 85 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86 PID 3228 wrote to memory of 4476 3228 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://mahrea.clickfunnels.com/optinggdl8m3z1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe32f99758,0x7ffe32f99768,0x7ffe32f997782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:22⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4872 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4048 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:82⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5572 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5456 --field-trial-handle=1788,i,2584969632220624773,18074654229825629141,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5e3fda6242b5f1593b20da09a46db64ec
SHA146d0da8260496af56b38578571f5754d6e3a16a9
SHA2567966c92616033e8ecc09aca2b63665c1607b7e9b5e70bb81d8753540ddaeb662
SHA5120e05e8b94bae83c62d484031f3fd51fa70df7ce402087c5ab8d11b6b055b0f9d9ab52f1906b57076707394632564e168ae30d3b4abf4363968c0d7e42a678746
-
Filesize
3KB
MD5e7f10a98848c4c69ea321fd334a3b1bf
SHA10cfedd6c419a608cace0da59ec35461e0c53dfdd
SHA256d8b481b894ced090b1055601e93de4252d7ecc709e09d9dffdcb048e5bebd2d4
SHA512087793fb4a29022aa0fb62a0ddfe1355c25d4a98ad8d6140369d76ecc209de5ad3bcb205be35fb8897e6f2bf77b329322861c913df776450f536581c92c0b719
-
Filesize
707B
MD5938aba6f30dfc4dfbd0857eab03d6a5f
SHA1aef57fcc384f7409575c15bdf8db6450cdc85f73
SHA25672363586e0664b9989387fc61a17a266962ed2e7677d5349a86c4bdb8a602525
SHA51218b34c3c522519340ce9cde06d8491a8cce60abb0710ecb7fd1144549b603de6714b4418434053970d255ddb3b5114c6d52216f12c1c7a45696d8b5c1b918192
-
Filesize
6KB
MD542d6f81c5fd015c89e824032be087bbb
SHA1d46b2658a2752ff1684176dc3d8703123c78f7a5
SHA2565b3d5b8b71c0385492b295248a611473c91f59e5dbdefa7d5e38b6ae79b2b81a
SHA5121820399bc0d9258979e1c7e28da92e1111d627445aeb9d0673814e7c9c9c7dd2725efaa3928debb194c47d7adb5de301328653d26a0a3cca28f48bf359e1b60a
-
Filesize
15KB
MD53bdaf34127b3d40a29455bfa3ca1815d
SHA1d281735c5afc0241b29ac17c923ba277ccbde918
SHA256aeea2176f4bb6a578c2dd9c8c0159a703fc76816a0be0c98ba03cce418b8124e
SHA512f57de4ee84d860356e0776958f7ba51df856ddf46e56f12d010be9026f481514f066ce911125152c74cacc97fc58e9496b13fa8cd415cfbab3ebb2a86fc3b0ed
-
Filesize
174KB
MD58d9d0ebdaf143242aa813f00ddf60459
SHA1ec5be35747e59dc517e798daf27638013f6c2fc4
SHA256e141e4240fee54055c024e7ce0fc70fc988292a924e7c93c3d867e3f95cd3c51
SHA512b11a476a65cf8abcd57d73f06cf823ca13db0efb411c1da6439d095bfab8ac3b8e13bf88d6ca9f964fe29fda2010d8e0c97e916d1418e6ef316984d630108a26
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd