Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 18:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.email.active.com/q/F8e5m5pXt8Odi5TH1KRLLg~~/AAOtGgA~/RgRmGXPoPlcDc3BjQgpkIQ_vNmTOP9stUhdrZWNrZW5yb2RlQHdlbGxzcGFuLm9yZ1gEAAAACw~~
Resource
win10v2004-20230220-en
General
-
Target
https://click.email.active.com/q/F8e5m5pXt8Odi5TH1KRLLg~~/AAOtGgA~/RgRmGXPoPlcDc3BjQgpkIQ_vNmTOP9stUhdrZWNrZW5yb2RlQHdlbGxzcGFuLm9yZ1gEAAAACw~~
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133257971894073944" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4232 4360 chrome.exe 83 PID 4360 wrote to memory of 4232 4360 chrome.exe 83 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 3944 4360 chrome.exe 84 PID 4360 wrote to memory of 452 4360 chrome.exe 85 PID 4360 wrote to memory of 452 4360 chrome.exe 85 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87 PID 4360 wrote to memory of 216 4360 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://click.email.active.com/q/F8e5m5pXt8Odi5TH1KRLLg~~/AAOtGgA~/RgRmGXPoPlcDc3BjQgpkIQ_vNmTOP9stUhdrZWNrZW5yb2RlQHdlbGxzcGFuLm9yZ1gEAAAACw~~1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc49829758,0x7ffc49829768,0x7ffc498297782⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:22⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1332 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3240 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3580 --field-trial-handle=1796,i,12503312613163674645,18255263398702296306,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52c229eea662b6fead169aa2755d26976
SHA1bd7c2fb096d99da7f7a252c47e9f450c2cbf5a36
SHA256811ebe5230d693230c0f51d5ea484d959177452689f01cabd6134b07da925901
SHA5126bf203580e55f2c5fcfca28e8497ea053f9ef01e434735892e42d8be6185d01222a2ad622be5994d7e005821b37ac8453cd99aaef18cdd00729edfc4f472c34e
-
Filesize
5KB
MD5163e448faa015d6f3eda97dff026252e
SHA1c849acd282ab0e6fe7dce27598dd6c4ab8e7a788
SHA2566f2ca1cc2bc3e3fb9a7a63909477a86b87f075599d584e0483ba1e5a2994b126
SHA512dd06425c4bab921eb22552f7bd760c090e457a1009eee94dfe8691fe53f2442ff2501f2494e05c47d7ebd6906522de24525614e2e4f91e22eb00265714035e5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\aa228b41-c820-485d-8a9c-a98f53cbd8ce.tmp
Filesize5KB
MD5903f616dfd63cccd9689560bdcb77be9
SHA18a539ee294afa598c062d266f283a050fa060b69
SHA256d77489e735e6116f7a7c0ac4dfe06c8e734cc8f10b14c7c1c78d129338ed5409
SHA5120210cdd56c883dfdd3ba88e356a7aee7f0f5eb7c66846d570d29d467b05d7e21dfde9eb0c0d17d58e90a0cc76388a477c1fe708416118f0329ae86de8ec28c5e
-
Filesize
199KB
MD54bc603218e6eeeb599e69c18ef51ab3d
SHA11fdd0c8f01264527a1c323bc35f97bf5796a4efb
SHA2566483c6d3514d27029175bb635ec3f297949b6c15a7744a85814069e063309155
SHA5124685b36225c96a22eb4f15820f9a0f6e1e9879df74e671dc95345ee17b307dd1fad95451d9ec1b1a45f0509f85e8a36c8204ecb2343e0965b398362e5f38bcde
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd