Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 12:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/click/30997027/app.cuseum.com?p=eyJzIjoiRDExWFVKcWhZRHVnUEVuTThtcEJjV1JnWjJVIiwidiI6MSwicCI6IntcInVcIjozMDk5NzAyNyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5jdXNldW0uY29tXFxcL3BcXFwvRXdScVpiXCIsXCJpZFwiOlwiNjU5YzVhMmM1OTIyNGM1NjkzZGRkMzZmYWQ2ODQ2YmVcIixcInVybF9pZHNcIjpbXCIxYjNhODg1MmQ0Yjc1ZmJkYWZiZDk1OGRjYTVlNWUxYWNhNzM1OGNmXCJdfSJ9
Resource
win10v2004-20230220-en
General
-
Target
https://mandrillapp.com/track/click/30997027/app.cuseum.com?p=eyJzIjoiRDExWFVKcWhZRHVnUEVuTThtcEJjV1JnWjJVIiwidiI6MSwicCI6IntcInVcIjozMDk5NzAyNyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5jdXNldW0uY29tXFxcL3BcXFwvRXdScVpiXCIsXCJpZFwiOlwiNjU5YzVhMmM1OTIyNGM1NjkzZGRkMzZmYWQ2ODQ2YmVcIixcInVybF9pZHNcIjpbXCIxYjNhODg1MmQ0Yjc1ZmJkYWZiZDk1OGRjYTVlNWUxYWNhNzM1OGNmXCJdfSJ9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133286269320377841" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: 33 3180 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3180 AUDIODG.EXE Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 5000 2076 chrome.exe 83 PID 2076 wrote to memory of 5000 2076 chrome.exe 83 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 728 2076 chrome.exe 84 PID 2076 wrote to memory of 440 2076 chrome.exe 85 PID 2076 wrote to memory of 440 2076 chrome.exe 85 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86 PID 2076 wrote to memory of 1040 2076 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://mandrillapp.com/track/click/30997027/app.cuseum.com?p=eyJzIjoiRDExWFVKcWhZRHVnUEVuTThtcEJjV1JnWjJVIiwidiI6MSwicCI6IntcInVcIjozMDk5NzAyNyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5jdXNldW0uY29tXFxcL3BcXFwvRXdScVpiXCIsXCJpZFwiOlwiNjU5YzVhMmM1OTIyNGM1NjkzZGRkMzZmYWQ2ODQ2YmVcIixcInVybF9pZHNcIjpbXCIxYjNhODg1MmQ0Yjc1ZmJkYWZiZDk1OGRjYTVlNWUxYWNhNzM1OGNmXCJdfSJ91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de97782⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:22⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:82⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4784 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4796 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3512 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2024
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x408 0x4a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD56728c545233f0d2dced428b8077fb3d5
SHA17106cfbc285d6cdcfe712c4c2ed50511caf41b1e
SHA25658f8d544d601ec19612305a5ce93c5d2b227ce0cd7c8cf87a7fa00469e11155c
SHA512d94eb8f8249e3e8583e56511b89492379d7d66de08ee469d896a6fac86c813cc3113f605a8f70b08d01bd24ec94ab8928ab4188232e93961e27204b98089ee90
-
Filesize
1KB
MD529f1c1e19513b7f355593ad79501ceb4
SHA139372de86992cf353e6e9e892ca599891c8576ef
SHA256c7599bc249fb10c769923a43670793cef89c077936d045aa5479cd228478e952
SHA51245fb5cf496a5a67e6dbe9ab8190239caa5521b3f2ea403d7767cacd132b73d5f891db9c16c47ca39dffaa36fc524dcc7c5e8f5c1e0bd787d12d672556fb66d7a
-
Filesize
1KB
MD5e55fb60a54fda0c6fc3ec496a6098df4
SHA1bca1de72f82ec27eb4ccc865e2fe8baf2be06dae
SHA2562930d79939a33885e9d1b1249fba8c530417c9eae26bd9588fa237a1058b097d
SHA5120c32099003de2b1ee55b6fe42ae93a250514acc0187b96852f7bb879cd0a98d8a9b6e296b0276255cd19d252770a2674eb49502d525f4e2130df30eb56f7473f
-
Filesize
5KB
MD56bacc078a77d88390b2dc809ef98e569
SHA1bd7c038c26ed7d428389bbc0d658035351975250
SHA2569a95515a7c20ea23ab3f2e6a2dac4e665fabd03410af60f0b74ab19520ba0468
SHA51208d7df20d12b058ecc81dca44111004682ff40f36617c09372a24a9719708d9311f4c273a300281f7e8b8c66a5982d8c04e888a23fb4abe6bc492e67b81cd7bb
-
Filesize
5KB
MD5b322b54b1d3fc225bb1052d751aef32a
SHA1ec41fead3951e1d1c9bff2c35cf357b00e0c5a4b
SHA256a3d5165d5f5ad7c4e7310704ae9cc14abdb5f344dec7a00abfb10f271399b38a
SHA51267d719b1472846c1992cb81985b9f0315216c7faa822fd660a5e0fc2a9c1e4a5e1ea4795476c0d251680099bec45c83cdf8309ebe93a177df6198db1f2e38bb4
-
Filesize
6KB
MD5a1f1a88db20b2f766cecfc34a531961c
SHA154b552e36449506c245441ed841960e1623b00fc
SHA2567a06351e2ff97fd45f1e29dcb83c7c4395bdc694e5d4426bc1538f023d356440
SHA5124d46454069e39c7f42228a0b32340083ea4cacdf95cb63db84f5339f77e215af6854ee46854bf82b919769b3599b1077437e79593da3bc57ee636473e2305034
-
Filesize
151KB
MD5bbca0c249e668eb092cf083a0aa3bf93
SHA156062869a07ee897c5a50332997b95c5b5b2a66a
SHA256ae94716d7f347b56e615433daca08e5f50dd99efa7c1115ac72044fb14d332e4
SHA51210b0362db3452ae4fff7c8c8be3d25b2287a0294a22174198155cfc61782b958e2616af42a5ecd440739350f096aca5985d1259a0649ff917c94fb6ae445d403
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd