Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 16:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://walmart.onelink.me/UIev?pid=Email&c=W-FY18Q4-Email-BTH-O-DG-General-AppDLFooter-BOTH-NA-NA&af_dp=walmart%3A%2F%2Fhome&af_web_dp=https://androidcache.com/bef/ben/[email protected]/
Resource
win10v2004-20230703-en
General
-
Target
https://walmart.onelink.me/UIev?pid=Email&c=W-FY18Q4-Email-BTH-O-DG-General-AppDLFooter-BOTH-NA-NA&af_dp=walmart%3A%2F%2Fhome&af_web_dp=https://androidcache.com/bef/ben/[email protected]/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3804 chrome.exe 3804 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe Token: SeShutdownPrivilege 3804 chrome.exe Token: SeCreatePagefilePrivilege 3804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe 3804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 1844 3804 chrome.exe 79 PID 3804 wrote to memory of 1844 3804 chrome.exe 79 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 2828 3804 chrome.exe 81 PID 3804 wrote to memory of 3116 3804 chrome.exe 82 PID 3804 wrote to memory of 3116 3804 chrome.exe 82 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83 PID 3804 wrote to memory of 3208 3804 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://walmart.onelink.me/UIev?pid=Email&c=W-FY18Q4-Email-BTH-O-DG-General-AppDLFooter-BOTH-NA-NA&af_dp=walmart%3A%2F%2Fhome&af_web_dp=https://androidcache.com/bef/ben/[email protected]/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd69f9758,0x7ffcd69f9768,0x7ffcd69f97782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:22⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3408 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3460 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4856 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3380 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5416 --field-trial-handle=1908,i,16006579000536335356,11030202500161800311,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5071d79f8ee08aab9bbbba7cf7e590458
SHA164a86796fb9c490a4c16bb9467a5b319fa429907
SHA256929169cb4fc8af88edb190232cfa5995f349742eba83c5cb922de442a984b5d0
SHA512f515bec8a6afe84512a8c046442016e15b2b5a5068014606ba74bea9dda350fe6de15f3dedf211e442c541d3a526e68c97ec450bee1505889486f631f5990897
-
Filesize
2KB
MD5b5b2b0f1ca18e6361d28bf5831dbcadb
SHA16720aa622e6e0379543540ff6f93086f89a58423
SHA256cd233a9641dba1dad53812cae00578256e838eb14b6cd6520ddf1d8a8fb7d3bd
SHA512099676e79ac96114aade5e5ba985f3f0b1c2114772580ae3ca9d96800cd4aba34df0712474ca998eaf4f450fd33ab684f80177c861ab77cb58fedbd2f7c188b5
-
Filesize
705B
MD55161d3a18781473874fc0760855d359c
SHA179b2dd10749290ae8b0ef5a95edd87772fb28690
SHA25632dca511921215064a4925e6dab20b663a0ed917f33b2096f71a37916a462d01
SHA5120b6e2cbcf63ea749422f8d0fcd5abc3535ab31cca926ecdd0d59c68c217d86a20aff2bec4fd442799e48f109347cda256481c91c618316064862281b3b89ce44
-
Filesize
6KB
MD5099fd0bd3368782cbfcb6eb8e6092906
SHA1bad09e16e3490b6d26d15b024ddb06b07e6698e3
SHA256c1595cf4fe090b80c764f748b7a104e8b4ec5bc9228521cb8bdb0d63c363e9b8
SHA512e804ab1feb88ec1ea029463f38144f63532a9435c6720ebf62a07e895d2cf8fdadc07bdc52fc66220625b5347b0cd63650e8e0cc8e4b04489d4b27adf0136bc4
-
Filesize
6KB
MD54ea7dd39bcf549ca8d4e8aef95d608c0
SHA11783a117d92528c6a1eb00013de085e9c6ca1579
SHA25662aed704645433ece3bc890f03d1c00605fb61d52c9ea16ec67bd04132ab6f39
SHA512b5cd027879a1b8b8467398adde11058cc625270e1a689375cb316af4d0cfe1600b2812e4ca685786a4cd6339ce4b061bf398f37e80923e8f86b17f039e6fe802
-
Filesize
171KB
MD53bdaa8cf39f1651f0832a42ee396fe76
SHA1d5742dae564c87f173a4dc9f087264f7c1ab9982
SHA2565a8de97d6a41a6fba644c0a8b05d194cc723c3fd729bc5050ea899f16ca6eb09
SHA512f676c40aee7941b715a6ef975803688b2b7524af987d08e43a5c78177ae0aeff11ad639df2a40a5223a3607e1e1d5ea38755cd124962d914c03ec237d9a32eda
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd