Analysis
-
max time kernel
124s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/07/2023, 14:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2famericanexpress.com%2fcrlditerms&umid=d7294e41-25ed-4202-8ca9-c3dfb665356a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fbfe803c938e1a2c6af58cc14325261c794f62f7
Resource
win10-20230703-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2famericanexpress.com%2fcrlditerms&umid=d7294e41-25ed-4202-8ca9-c3dfb665356a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fbfe803c938e1a2c6af58cc14325261c794f62f7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133331260279244170" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1952 3564 chrome.exe 46 PID 3564 wrote to memory of 1952 3564 chrome.exe 46 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4292 3564 chrome.exe 73 PID 3564 wrote to memory of 4436 3564 chrome.exe 72 PID 3564 wrote to memory of 4436 3564 chrome.exe 72 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74 PID 3564 wrote to memory of 764 3564 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2famericanexpress.com%2fcrlditerms&umid=d7294e41-25ed-4202-8ca9-c3dfb665356a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fbfe803c938e1a2c6af58cc14325261c794f62f71⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffba6b9758,0x7fffba6b9768,0x7fffba6b97782⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:22⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4348 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4756 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1844,i,3263189916387735768,17148173113609376840,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5386a0d29b94ca3e2641eb4a7ce51e385
SHA1ad05c4e8265c65013024be078626cbb31812f654
SHA256b3aa6c9c4cb256f6dc32c5c5a75ce9b673f477bb0dfef5871874d6ce3d7d7965
SHA512231c9f7f51132f3632b125c5364e63bf5a122b58c8356c4d60c1ebc4ea499cd575600aa29566c2c4090ad98a414ff3937186570943293288a457a3aa95f44c32
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_lpchat.americanexpress.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD59d5b9a9ea5c660e9056906e85ca8a514
SHA162341c3e843078e2236b4cde244ebc517bcc0db1
SHA256d496fade665d8174b7080b0c6c671a32f203984a3243e4f4b99c730f941c6aa3
SHA512c72a28628097af60df58bcaab2616e5e95c73fb6806f55aed1501a004d20096458edc1f273beec448c31d828a61b6170c234f6b7934787cbb2aab106e7ab980f
-
Filesize
3KB
MD5aae3baacfa8ff36c4d779834508f74b4
SHA17df78dfef1089a0c6e5c8b2979fc7066c6b6efa7
SHA256d5237d529e702df405ee61af774f9e68367ca56554eddabfd6900d3461140846
SHA51217d184a29d8ce2e455e0fc8da1503c9e9f97a021492f4703ab5ef6f16cdd0f3d4a93b9c384bf15307744807fe05622efc3e4a0f365ccba794d6901152cf22a50
-
Filesize
2KB
MD5ae1efa0cfce45f590c31850f226a1d68
SHA1b568a7d53b2d6242106dd3f35b268a0637e5613f
SHA256a86e37b47f5f56987cbd81dec90deadb746cc5869bb18e53ace398edf6c0bdc5
SHA512635fd82fc9e598f796b03c11b527f31d6ca6ea4db7a8b89102e917103acabded2f4382d274f79f6a9162e274b0102cf2d5985438185d274f0934e4c13408bb6a
-
Filesize
6KB
MD5c975d79c8f26b133eeaefffca4ce205a
SHA1d2a392c6dfc9d156d3a19626b7854d2fe2fcf9ef
SHA25660626438ddcd642e749a07f7a3662a17350bf7666b10a726e9b0d8ea629bfc00
SHA5129be2641e57021c10f8f60f0d45c01fe7c6a3a729d93f27d0498dfa0c9a31536a93edf0bc2783e8243f45de5368b2f4642230e553b31367edff1439c0afb0d34a
-
Filesize
5KB
MD588832512139ce15db4b3a1ca133236a1
SHA11ebb7144b1b9cfab5a94ca4b4c98d47ab35ee46e
SHA2561fa77bde1cf5f9f0e1f9517e14712f004b8035a3765d5ea13cad45f84b04c4f8
SHA5129183e053a088ed5dfea5b748a8d171b03aa4fa6e438ea570031644eac45cc24b7641d6b09df862bb4e011ad57a3218b9f36a4bc8064f716c5c8e889259507463
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD52829973a17fb98dc2d7ddd7029e49f32
SHA122da269944d92fb2e0c9878a8e83b492c6c98354
SHA256009a69dff2f14bcde68b9e31dd3a80dfc69e0f80a1ecaf918a21362c476cff6d
SHA512775da7d19119d1d45cba8f348261e5d1484eb4112e7fc5c08167d744a920fcba612f5f4adcfb225238a0cf8bae5e634c722fc458fe2fe59c96bdbdb5a3fce7f0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58117f.TMP
Filesize48B
MD5688a2b83f04876b9d8b3912a6efa2de0
SHA1c24239c43de82c9eb659b5eb079a8ba8b0dfaae5
SHA2562cc51654753b05d3dc263b43456fdd12aa280d0e2529c6050db6b13039053bc2
SHA512b160c80b6980f0816937c10aec325b789227a3c9eb51b7dd5c9c534662b3bbae3fda875f4eaae9174c2020efce9c42ba746a7c273a30921d7c960e18c3e7f684
-
Filesize
171KB
MD595fe983d3dbe63fb9f190a208c3d8fce
SHA110e74f39da4f1cf811eb81e1795fffcb9f15a767
SHA2560202b88c0c77f97511753faefaf78ec82df9028ebe6ef4053c28cc0799f02721
SHA51230fe2384968bb93145f9455a15ac37b9794058d3e65a35b20fe2cf0beb6e18ec72d19230be5c6a7695c109fdde6400c1cc2ed79cb5ba3843c582d98cb80ccf19
-
Filesize
171KB
MD54e7ef6acb1c7c8bbf1afaa1e465109cc
SHA1f3fb52f0be6d3b1e0bb76b78c1ff6bccb4a88c1e
SHA2569204ebb7d0485529853603de65001a684ae0a4cd6eba78467498d90724a0e663
SHA51220a178bd8ea913debed6f1913b487d346e1c89cdf30f97b8d879860a7458c9af63da559e4af04e9aad35f6b83ca0a03f0e898326f24a17f4a0b2c6d06f0a0a8c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd