Analysis
-
max time kernel
180s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 15:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ambitionstrikes.us20.list-manage.com/unsubscribe?u=9c6a1a55f9df9fd14cdfb8e66&id=61e0ab8971&e=52a78785c3&c=7b13326e74
Resource
win10v2004-20230703-en
General
-
Target
https://ambitionstrikes.us20.list-manage.com/unsubscribe?u=9c6a1a55f9df9fd14cdfb8e66&id=61e0ab8971&e=52a78785c3&c=7b13326e74
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336511432738496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3084 1924 chrome.exe 85 PID 1924 wrote to memory of 3084 1924 chrome.exe 85 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 1972 1924 chrome.exe 89 PID 1924 wrote to memory of 4416 1924 chrome.exe 87 PID 1924 wrote to memory of 4416 1924 chrome.exe 87 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88 PID 1924 wrote to memory of 2364 1924 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ambitionstrikes.us20.list-manage.com/unsubscribe?u=9c6a1a55f9df9fd14cdfb8e66&id=61e0ab8971&e=52a78785c3&c=7b13326e741⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc84eb9758,0x7ffc84eb9768,0x7ffc84eb97782⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:22⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:82⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4976 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2864 --field-trial-handle=1888,i,12140286502564787824,1657169162418503740,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD582f526bc521d6cc3913d2f6d3b5b3e16
SHA1a6563d0eaab91c219abf4e0d4fae779f3c6d1441
SHA25651818032d5b0a89e06a2200a3599a4ed5ec5b2c2150639ac9d7955d3eef1f73b
SHA51236283d508652fd6400d0dd0a4b0354248818e9c9a4f299ebd40db8c9272fd55462d513a3ae3801c5626c33a11cc8c4fe35addb898e011cb09724ff6e749acafd
-
Filesize
2KB
MD5aebe5b8796674698fb5bb9450ccd5113
SHA16d414aaed3b527668a013b4dbc6eb0ae6f6442bb
SHA25661a3bf493c9d120d991d4b1badb4df3248715b422dd5ef6a99933364c2f35402
SHA512ee324a08253e9c7dd4ef3c09d7c6f27bc7a7c77c0c7f80629388e77d00ecddac7187490c330ae587523a576802740b9c3ef87ed21488d5f7b3c2b64259fa145c
-
Filesize
6KB
MD5c6bba1c0edadea42fdcb1ddc3b748d16
SHA162f4ccfa44308dc2dd82b42d286fb7b0ff716d5e
SHA2560f57fb1f6c3b7d9573d43e6c4e4ec644f7e3e0e9eff8a1024e7e4c658b9f55be
SHA51245e87dbd54b6d61141d6f681dd5eb051ff933c8cfda96cea500ed415334ecc7eb78fea87d1188846d956cd13141dbca0bb4bedda292ec53891206d8aa1b64584
-
Filesize
15KB
MD5ec065c311d8a7052f06650196fcc9b30
SHA12f93f128d6af67dd078942cbd8423ca0deba97b5
SHA2560deebf468944413651c46f4506228d6484b4350e2a722afe50e4a90486bff523
SHA512b7e18986ebe053541354ad51d791b697152c9d88da43e2c8755ce8ac07b06cd37368c0b9847d1e7cf113daf5f2dc2a7d741980c6aaeca72990ff6fcf1347c936
-
Filesize
173KB
MD59d4cb6f84ab79f02a555816e4ed85633
SHA1b0a463668896c6c40d0f285f2ddc4409d813e210
SHA2560e63d9d0037a977ce8898de8218f37f808589a99fa65575a4c29208bcaf446d6
SHA5127edc6c21e37a7f08d2a2e1e87ce648edbadbe974230339900b060bdfe1e8ab05c6c7bb66d3002fc7d9921028c541c7b1f75aa1b183e03bc1168765ba3c67e1d3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd