Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 01:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.planmylegacy.org/?qs=91eb57d033a528889ff982d3a3df62cd64704cf1daf9e4b1d8849577becde3ba4c2a3ff9d4466cbbe231c22017a39463e64e11e673f50376b916e9e4db16d0b1
Resource
win10v2004-20230220-en
General
-
Target
https://click.planmylegacy.org/?qs=91eb57d033a528889ff982d3a3df62cd64704cf1daf9e4b1d8849577becde3ba4c2a3ff9d4466cbbe231c22017a39463e64e11e673f50376b916e9e4db16d0b1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294581600451002" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3856 3964 chrome.exe 79 PID 3964 wrote to memory of 3856 3964 chrome.exe 79 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3396 3964 chrome.exe 81 PID 3964 wrote to memory of 3260 3964 chrome.exe 82 PID 3964 wrote to memory of 3260 3964 chrome.exe 82 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84 PID 3964 wrote to memory of 5036 3964 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://click.planmylegacy.org/?qs=91eb57d033a528889ff982d3a3df62cd64704cf1daf9e4b1d8849577becde3ba4c2a3ff9d4466cbbe231c22017a39463e64e11e673f50376b916e9e4db16d0b11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaca99758,0x7ffbaca99768,0x7ffbaca997782⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:22⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4776 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:82⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=832 --field-trial-handle=1832,i,5965581277290841322,16823876534617257261,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD51ebec92ea958679130c374696d8da74c
SHA14342c0a9c6b797594cc276e5d84dc82ec336f0aa
SHA2564498d1cf72a2401bc560b9253e97f19fa9ad25238f71da799bb9efea1d6e0ebf
SHA512d64e1c127f3909ef9bfedd325cb9de526bb1005c71f19e6f7f1f8e35697fb09c4ee325f93453cbd97931793746b8b15f620a7e747e966d42aa7b74d9ac34a87d
-
Filesize
2KB
MD56cb3b6ec9b9ff128f37a3668b36c2a1a
SHA18f70f9f73b5a4f9a9b4093e1bd7d76a848ba5f6f
SHA256f228e0b9e63495bd8587d41c1420d02cec0805a3ba07121f4e5c68fcc2db5cfc
SHA512f6207b4f5757fe66947dbb52b38886dc20b8a8615ff05c0fe58cf346d3ac67b9b2cd0691cba56989cf8b998b4fbfba6212e4d45cedc26eabed5fd807559c13f5
-
Filesize
539B
MD52267f9ab80d536ec12d088b58c9028a7
SHA171e3987b5c2ad7cd4a2a929e46e03926da830077
SHA2563e63c0b0b6cd76b77486c7b9f326f2acf72bb52e8899930688076d4ebc8ec59e
SHA512cb7f89865af5806c12a91cb00020eb94d7f81bdbf6e0d69cc6cbf37d71344d4e2dad515130f30852706dd7eb3ba450311f37a1fe383de335f7e40560f24ff6cd
-
Filesize
6KB
MD56f538ad1d18437787ab9ebb0d4748694
SHA1a85adb868091cd8dc93e6ff95a8a3c2f00a113b5
SHA256d084ca73d76ee2c53704dac9be9057c63c00e35ac12b59bbc3bfb80ee31a0903
SHA51272362d7bfc056ad2581c3f6c43d62bf35c0dcbdf7837b93ccacf1b0dc64928a3ed2aaa9e420fc53fc637d3e8288848d600149ebecff85f187c1661ad4f3404f3
-
Filesize
15KB
MD5f7489f10cc00579fd796489aa993217f
SHA1c793b00f90634296ec95c5f072bd4a62d1e98309
SHA2563e2830325d3bd938f2e2707b6ecfb1c994a7810945be7e1176931377bca9c02e
SHA512ddc835956ee27f189ba77f8c1b95077a0075a4d9204e339fdca7290b6de1b4a43ae93509f6eaa701219ab98521766fbaa2a95f15b4ddd7a63abc76043ff9b0e9
-
Filesize
152KB
MD5ecb7416415d92d367489d09b7867be8d
SHA1197d61cd15d5806ae104f7ab31c14bd2cddb9147
SHA256faa0e257f858ecbd9bcb4b1b346dd9f199d27b7379e3465027183bf72c35ef5c
SHA512d3d2ca7b42b671196f29d05a4d27027d3162e6ae0b4131e3812c9501fdfdbd7549c6057d16bed8354605ccd6c6cc5f1abd89e1ae82323cd26ef88313d32270f0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd