Analysis
-
max time kernel
9s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 23:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://click.classmates.com/f/a/Q8iWmH82eL93vcEzmADv0w~~/AASNHgA~/RgRmUA5NP4TOAWh0dHA6Ly93d3cuY2xhc3NtYXRlcy5jb20vZ28veC80MDAwMTYxNTk1NzYyL1BPUzN8Q0JfUFJPRklMRV9OQU1FRF9WSVNJVF9JTUFHRV80X1JEX1NFfEIxLzQ1YmYxMzZmfjQwMDAxNjE1OTU3NjJ-TkFNRURfUFJPRklMRV9WSVNJVC1TSVRFVFJJR0dFUkVELTIwMjIwNEF-MjAyMzA1MjMyMDQ5MzIxMzUvUEc1Nzk4L2I4YTY5NzdkZDQ0ZjFlM2M5MjJlYmYyODUxZTJjNzUxP3M9ZW1haWwmQ0FNUD1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QSZURU1QPVJFU1BPTlNJVkVfTEFZT1VUJlNMT1Q9UE9TM3xDQl9QUk9GSUxFX05BTUVEX1ZJU0lUX0lNQUdFXzRfUkRfU0V8QjEmUFJPRD1Qcm9maWxlX0FjdGl2aXR5JnV0bV9zb3VyY2U9UHJvZmlsZV9BY3Rpdml0eSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QVcDc3BjQgpkYk2JbWSLafGSUhNqZWZpc2hlckBqZWZjbzIuY29tWAQAAAAA
Resource
win10v2004-20230220-en
General
-
Target
http://click.classmates.com/f/a/Q8iWmH82eL93vcEzmADv0w~~/AASNHgA~/RgRmUA5NP4TOAWh0dHA6Ly93d3cuY2xhc3NtYXRlcy5jb20vZ28veC80MDAwMTYxNTk1NzYyL1BPUzN8Q0JfUFJPRklMRV9OQU1FRF9WSVNJVF9JTUFHRV80X1JEX1NFfEIxLzQ1YmYxMzZmfjQwMDAxNjE1OTU3NjJ-TkFNRURfUFJPRklMRV9WSVNJVC1TSVRFVFJJR0dFUkVELTIwMjIwNEF-MjAyMzA1MjMyMDQ5MzIxMzUvUEc1Nzk4L2I4YTY5NzdkZDQ0ZjFlM2M5MjJlYmYyODUxZTJjNzUxP3M9ZW1haWwmQ0FNUD1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QSZURU1QPVJFU1BPTlNJVkVfTEFZT1VUJlNMT1Q9UE9TM3xDQl9QUk9GSUxFX05BTUVEX1ZJU0lUX0lNQUdFXzRfUkRfU0V8QjEmUFJPRD1Qcm9maWxlX0FjdGl2aXR5JnV0bV9zb3VyY2U9UHJvZmlsZV9BY3Rpdml0eSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QVcDc3BjQgpkYk2JbWSLafGSUhNqZWZpc2hlckBqZWZjbzIuY29tWAQAAAAA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4476 4984 chrome.exe 83 PID 4984 wrote to memory of 4476 4984 chrome.exe 83 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 3280 4984 chrome.exe 84 PID 4984 wrote to memory of 2396 4984 chrome.exe 85 PID 4984 wrote to memory of 2396 4984 chrome.exe 85 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86 PID 4984 wrote to memory of 2132 4984 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://click.classmates.com/f/a/Q8iWmH82eL93vcEzmADv0w~~/AASNHgA~/RgRmUA5NP4TOAWh0dHA6Ly93d3cuY2xhc3NtYXRlcy5jb20vZ28veC80MDAwMTYxNTk1NzYyL1BPUzN8Q0JfUFJPRklMRV9OQU1FRF9WSVNJVF9JTUFHRV80X1JEX1NFfEIxLzQ1YmYxMzZmfjQwMDAxNjE1OTU3NjJ-TkFNRURfUFJPRklMRV9WSVNJVC1TSVRFVFJJR0dFUkVELTIwMjIwNEF-MjAyMzA1MjMyMDQ5MzIxMzUvUEc1Nzk4L2I4YTY5NzdkZDQ0ZjFlM2M5MjJlYmYyODUxZTJjNzUxP3M9ZW1haWwmQ0FNUD1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QSZURU1QPVJFU1BPTlNJVkVfTEFZT1VUJlNMT1Q9UE9TM3xDQl9QUk9GSUxFX05BTUVEX1ZJU0lUX0lNQUdFXzRfUkRfU0V8QjEmUFJPRD1Qcm9maWxlX0FjdGl2aXR5JnV0bV9zb3VyY2U9UHJvZmlsZV9BY3Rpdml0eSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1OQU1FRF9QUk9GSUxFX1ZJU0lUfFNJVEVUUklHR0VSRUR8MjAyMjA0QVcDc3BjQgpkYk2JbWSLafGSUhNqZWZpc2hlckBqZWZjbzIuY29tWAQAAAAA1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc6fa9758,0x7fffc6fa9768,0x7fffc6fa97782⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:22⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4756 --field-trial-handle=1836,i,17406651283707243452,6803776273628464542,131072 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59c8d0d71031eb41e355fdb1266d9067f
SHA1ebe2b7c28660391f8e82cb73db6ccaf46dfe7855
SHA25615aaadda3d44bf0292d3380e6e10e5c9478c717d9bb5949359a4feb1f66867c3
SHA512bc9a247fe21a252890cec3061c600ca08037594a7ac1db06cf016d5254a242169a5a678465dd773356ca32b1415f4de26fc6c3eb521db90670b4c708fff936fa