Analysis
-
max time kernel
209s -
max time network
193s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
30/05/2023, 01:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://internetkeno22544.lt.acemlnd.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZtZS1xci5jb20lMkZlanlXVTJEZQ==&sig=2Jc6DGcChw7KWnc3D38isS8LLgAmEMNnAtGaMqMjRtmu&iat=1685401537&a=%7C%7C652134305%7C%7C&account=internetkeno22544%2Eactivehosted%2Ecom&email=rjMx0DGnFUc5&s=819aihwv&i=040779
Resource
win10-20230220-es
General
-
Target
https://internetkeno22544.lt.acemlnd.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZtZS1xci5jb20lMkZlanlXVTJEZQ==&sig=2Jc6DGcChw7KWnc3D38isS8LLgAmEMNnAtGaMqMjRtmu&iat=1685401537&a=%7C%7C652134305%7C%7C&account=internetkeno22544%2Eactivehosted%2Ecom&email=rjMx0DGnFUc5&s=819aihwv&i=040779
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133298925709549030" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4464 4404 chrome.exe 66 PID 4404 wrote to memory of 4464 4404 chrome.exe 66 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 4076 4404 chrome.exe 69 PID 4404 wrote to memory of 3152 4404 chrome.exe 68 PID 4404 wrote to memory of 3152 4404 chrome.exe 68 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70 PID 4404 wrote to memory of 4264 4404 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://internetkeno22544.lt.acemlnd.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZtZS1xci5jb20lMkZlanlXVTJEZQ==&sig=2Jc6DGcChw7KWnc3D38isS8LLgAmEMNnAtGaMqMjRtmu&iat=1685401537&a=%7C%7C652134305%7C%7C&account=internetkeno22544%2Eactivehosted%2Ecom&email=rjMx0DGnFUc5&s=819aihwv&i=0407791⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd5fbb9758,0x7ffd5fbb9768,0x7ffd5fbb97782⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:22⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3304 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3024 --field-trial-handle=1820,i,14933492118968122601,12887688860955965855,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556f94121cd3c106027bb20565f945477
SHA17c58103fa3d11fa7df8d4bffe07819dbd3634bbb
SHA256c9132b44b2434aa9202cba2d3045c6682ae7b675296c16fccb279a5437915f3b
SHA512b720c2f0e618af1ead05cf023407076f54d06f8c57dd839b151036b2ab59dcc7dcdb7dd307254b23957e4d74d4e1ef56d1cce0be131ae441342cd2593450520c
-
Filesize
5KB
MD58dac55f1ac10872e51e0108bc497a94d
SHA1902c3396eeea36e1b97ec6ec24f5bad1162cc2dc
SHA256c7bd600890b0a419da420303458ded034011fe19898827c01aca525ad5e515d5
SHA512ad280232e765aceb9cdcf18ac4718d93aec76d16ae06cacd3cf665d2cdfa33c0e2ad9d0044e624147e5d282eb86e2e061d2b32ee8659424b1ef0155290d33615
-
Filesize
5KB
MD59facaae04dc71c267d341ce6d795b1f8
SHA163bafc8cda85e0397bd4f5f74d37e9ea479fe5ad
SHA256e646f370927dc8a1e0c6189183c4c63da789d36cb1961f7b327d1bf1d6544e34
SHA512148e387d48b65a56ca611c6e8cbf4c0c9be5919c7bdf870db71bfe067bce5f3b03c79cfcb3279b245ae312478d51d6cb6f682bbbe44f7ff7382f677dcf8b0212
-
Filesize
6KB
MD559562ab4e7675c6c936471ea39b625ec
SHA1bee91d7643b7fdff4d8de4fff8f23709a9c50cd1
SHA25618f739081e01ac06aa5e4227d61b56668dfeaf5fafa84e0832dccc4d74536449
SHA51209bb9a3281cbf726d4242b16823e67b3404711af793fb861700e5d02ef129c2c7b8969100a6a110137d5e733fba5b7f3eb01a4b89ce04637b6daa07b50a2dcdc
-
Filesize
12KB
MD56f64b0fa51979842478d32a9e898ee26
SHA124dedeb90b012fb2fbffaa45c6e4bc6e26d6ccfb
SHA25609d26e5843792ca5ccb7a0f5b96ae8b50f373b953917d11afa9ddc33ae6c9f01
SHA5121e520dc334385bed15075c05ea523c4cfc61e45037c4497d4efb7efe873d05aefc9829f34955b0f62f167d784281cf7458ebd20bcd09d41e39c98587bf6805f6
-
Filesize
154KB
MD5f9836554efb8b18752170faae3364ecf
SHA16f5be0661b4491627d6abd2245fdcb843d371181
SHA2565bbf839ab2a7af3a9f5aab426a09d054b480bbe3728789328f9d6d98c3a3bd74
SHA5125f712b8b9d31f677a1b452a66aa70accb2703214a099a137074383d4bfaa01c4bbca8d5941329962dfbcd2ef3df11a0446556d14af0da2946e854994a898757b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd