Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 21:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.theoklahoma100.com/c/1gZv7m81owRW3rUtcfpxxQxAxqDy
Resource
win10v2004-20230703-en
General
-
Target
https://email.theoklahoma100.com/c/1gZv7m81owRW3rUtcfpxxQxAxqDy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337576765474248" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3664 wrote to memory of 1924 3664 chrome.exe 84 PID 3664 wrote to memory of 1924 3664 chrome.exe 84 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 2432 3664 chrome.exe 87 PID 3664 wrote to memory of 776 3664 chrome.exe 88 PID 3664 wrote to memory of 776 3664 chrome.exe 88 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89 PID 3664 wrote to memory of 4384 3664 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://email.theoklahoma100.com/c/1gZv7m81owRW3rUtcfpxxQxAxqDy1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa04d69758,0x7ffa04d69768,0x7ffa04d697782⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:22⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4880 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5044 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1876,i,564668777125887374,2860516237962364539,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744B
MD54b5c6137aab7f092c5ba126b6bab5855
SHA1f49047b6493cd27e61e248b82f2e3f061dc3a4d1
SHA25670fcbb33bd79c96bca0cf6202aaebd3ed8d35238e5c7270f0671ab2b8e280bc9
SHA5126f8309148483dd8b1d10d85c46775052e4599b54d1ddab6cfc88423072f73e5e713f0a6bb241fb50303b680e3a39ff400633db0135cda16a51af5a5b66667820
-
Filesize
4KB
MD5ff61761f92c48cac51de212aaed8408f
SHA1831c1cd17361f80fd73f7e92969dff150f74ba04
SHA256009a1909e8c735cc0301f55432f48a8fea64ec4f92ea1bef410b320087a5dae7
SHA512be8683f2f87e48be76163797cd9aced5d6d725fc474336ec8a443a7031d33c11770bb0ffcd2ac76797fa396ba4d26b375c6cdc60334eae4cbc2af577ffc4849f
-
Filesize
1KB
MD5e107b820768d37d3a7e09a559933c4d2
SHA1f099d5fb6a9ba5e71b45dda65fdc8266a3a35c15
SHA256e9c48062e935c9b9740e43fb1cc1e1d3168eb7ba9883066a873fbd46314eda59
SHA512bbfbb12f282da543d55b9ce24249176884a3ad72ba10f14e874de1d6b615c0982741950e8297ade4687b67715fd45da370b624f1168a1124431040c8029c35c7
-
Filesize
1KB
MD55baaa92b0a17045b3007bb595e57ac0a
SHA10b13e5d8321328c6b5ca3459bf287ef73a212657
SHA2562ec41daa7d40935fceb827047bbd0c6cdea2fca3cc8d73d3d86d517d0bd92559
SHA512debccdc1d404cb2a4f1fd76966c97434b73c92bd00d3713a3532e7f5abc1595a7dd04cde768bef782635eb254b28fd4d92ad7b54d32e15eb266774536f2cf824
-
Filesize
5KB
MD5be9498f54571e30aa5a9521a4e7ff65a
SHA1e6296fed5665ac7d3d08ef9734262b5127796f4a
SHA25605b3fd86a34bfef10a588189fd8f87ad66b4d25161c8e04af2b6146f0cc4e510
SHA512631a22cb57f8baf8381398576361505c9fba50e042d31418696b78da67930a87cf8e780c60610683e36ab8ac10b97dd807a7212685f9a64a68928c236d3d4da5
-
Filesize
6KB
MD5b485e1e846ab84cecfff750f4c76e16d
SHA16952b11f403a12a1e007f749123708a37248163b
SHA256e77db9380b6bfc697410690c58179cbb54c64f3e926f202f5a96a4131f6d263d
SHA51289d934df1e6008ed94cdb90cbd5936bb09e38e3dce28cc1da71382d2cc28be57f86e9f556dff7cb159998b58f672633938d68dc792d225434210e36b2ae40521
-
Filesize
5KB
MD53941a9bdab0b44b1eae01cb838991e9f
SHA18c75fb87272b19d1c3b525327074ad2bdafe5b9f
SHA2564fd9378c54ee634c88698d73d416d44a1050adc80a7fd5683237c8df2554411d
SHA51200a6eed287a77b0b8a2d7b1c16ff615b5fd1f55ba04c36f6f22e41a7965855eab1adbc06d071de2bedc8e7e31161dabd4256da0da01f00409ba44984613ecc22
-
Filesize
87KB
MD5618b07acd9d84dad42719748bd7acedd
SHA1beedb28777188718530da92948d90e7e7308d6d5
SHA2560580261d729c85f11b19d97e69f9639913eac8452ff3ab5902ae8b8dbbe97222
SHA5125f1dcfabdda322fda77ace24afd38b20b50e0bc63b56fdd424121c891716928d38f8ac7bbd383d1c4bc38a25e483c65347738bc221504c376ebae30af321fff9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd