Analysis
-
max time kernel
51s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 14:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.onemnethealth.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vnd6b38hpQzbVKgBH13zd601W2m7kF73zdYZbN1JxwY5WXsSPM69Sn6QtBM1W5V31KP6G2p-_VDmyBZ8YsDF-W62T3Wx8c9jwXN5lsblJ1yf0NW30MYjf54NnFVW72vSf63HYn8_m_S9VP4L3&v=3&utm_campaign=MQL%20Inbound%20%7C%20Physician%27s%20Office%20Oriented%20Campaign&utm_source=hs_email&utm_medium=email&utm_content=264947621&_hsenc=p2ANqtz--YI706nZXo4452_RTlTyQBo-yZpqAMlxLJ3BDh2Rc3ipuX2Wf3nFi3UFtMnK8EzwrJpSEkA6NfogM_QOQ2_qU57GPXzQ&_hsmi=265045320
Resource
win10v2004-20230703-en
General
-
Target
https://email.onemnethealth.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vnd6b38hpQzbVKgBH13zd601W2m7kF73zdYZbN1JxwY5WXsSPM69Sn6QtBM1W5V31KP6G2p-_VDmyBZ8YsDF-W62T3Wx8c9jwXN5lsblJ1yf0NW30MYjf54NnFVW72vSf63HYn8_m_S9VP4L3&v=3&utm_campaign=MQL%20Inbound%20%7C%20Physician%27s%20Office%20Oriented%20Campaign&utm_source=hs_email&utm_medium=email&utm_content=264947621&_hsenc=p2ANqtz--YI706nZXo4452_RTlTyQBo-yZpqAMlxLJ3BDh2Rc3ipuX2Wf3nFi3UFtMnK8EzwrJpSEkA6NfogM_QOQ2_qU57GPXzQ&_hsmi=265045320
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1688 1404 chrome.exe 51 PID 1404 wrote to memory of 1688 1404 chrome.exe 51 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 3040 1404 chrome.exe 83 PID 1404 wrote to memory of 2004 1404 chrome.exe 82 PID 1404 wrote to memory of 2004 1404 chrome.exe 82 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84 PID 1404 wrote to memory of 1332 1404 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://email.onemnethealth.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vnd6b38hpQzbVKgBH13zd601W2m7kF73zdYZbN1JxwY5WXsSPM69Sn6QtBM1W5V31KP6G2p-_VDmyBZ8YsDF-W62T3Wx8c9jwXN5lsblJ1yf0NW30MYjf54NnFVW72vSf63HYn8_m_S9VP4L3&v=3&utm_campaign=MQL%20Inbound%20%7C%20Physician%27s%20Office%20Oriented%20Campaign&utm_source=hs_email&utm_medium=email&utm_content=264947621&_hsenc=p2ANqtz--YI706nZXo4452_RTlTyQBo-yZpqAMlxLJ3BDh2Rc3ipuX2Wf3nFi3UFtMnK8EzwrJpSEkA6NfogM_QOQ2_qU57GPXzQ&_hsmi=2650453201⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa90ee9758,0x7ffa90ee9768,0x7ffa90ee97782⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:22⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2296 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:12⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4828 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1984,i,323899089239482934,17399234567004044054,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD510c19e78b8d83d645319848b4c120286
SHA1fcc504884b16d5b729451bf7e71971e058fc572b
SHA256be41d3fd88724db0e58ad27817c9bdfd53cbfd17510d6df9c570f28974c3e98c
SHA51208022a8485ff83c99d3295c086af28928fd194f19531acb0bf0bfc2c0df93866da92ab44ee94b4ecea18ad16b43e00dfce8cb3e9814c80fef9480ff27014a7a6
-
Filesize
873B
MD555fe7ce07d9a14c5fa3bfab9dec6f0e3
SHA181b952d3809a84c08a9f2b64f82028ea04d12de1
SHA256124648840f762d348caf18882fb57b71125b0fa7db3d7fb78200157b439a3814
SHA512bb24b42b378ffc6e7041a47f665fe14403758e94c737d035747112dfd866ddbae577b9a6161458dbdad9a009343d02fd8563442d175dcbbc8bb1e74714346076
-
Filesize
6KB
MD517e157a6f3aa58e7cc47654dfcbc60ce
SHA1af8ce5854b94bc34306bc9973fe83730bc819142
SHA256a9abe0ff47c3968ab223d1a224760ef5852a58304fe32a634e735a86f902a8cb
SHA512c09e6b077d21b5d87a33bee66315e2518a8763fbb8b3a69eab03edec14014970a100f585ffc25d82cc23c69971ca1c8df839567bedee1e577d29cb9211698876
-
Filesize
173KB
MD535872f5a52c80b4f6adee11f2f6ace4a
SHA1d19a51cbc5e16c8a9b78028fcbc6ccb209350a0c
SHA25607cc42bc4710fd2f2d09880aec7d56799b1cfeb9b01c8e33f95e46705ef2e5ee
SHA5120a426c7aa69748de280a80d869c4383bb469670f090f781654174a1bc69908d661c86951d6c1e0367eda6bf94f1ba25d171821080baf809eecfd11c950af5d2f
-
Filesize
89KB
MD575c0c652cbf0706618d3c788f373968a
SHA167872102952c25f8a69fd6e4fdddfaa886a287c0
SHA2567a2bbcbce770f9fd1b233544b768864268bd7467efd1742adbf94d1d55d87e91
SHA512fe28fb55f7cbe51260409bcbbef96a944b06060eda29225bfa18037bdf520b5c753008543a43fac72d8db0511c99ac2a9bcf2afa64d5fb35af0399d378dfb365
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd