Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chipotle.app.link/?$3p=e_et&$fallback_url=washingtonimmigrationlawyers.sa.com%2FcmFuZGFsbEBtd3B0YXguY29t%2F%2F%2FaaFuZGFsbEBtd3B0YXguY29t
Resource
win10v2004-20230703-en
General
-
Target
https://chipotle.app.link/?$3p=e_et&$fallback_url=washingtonimmigrationlawyers.sa.com%2FcmFuZGFsbEBtd3B0YXguY29t%2F%2F%2FaaFuZGFsbEBtd3B0YXguY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133340598590501689" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3452 4948 chrome.exe 84 PID 4948 wrote to memory of 3452 4948 chrome.exe 84 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2432 4948 chrome.exe 88 PID 4948 wrote to memory of 2784 4948 chrome.exe 89 PID 4948 wrote to memory of 2784 4948 chrome.exe 89 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90 PID 4948 wrote to memory of 4440 4948 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chipotle.app.link/?$3p=e_et&$fallback_url=washingtonimmigrationlawyers.sa.com%2FcmFuZGFsbEBtd3B0YXguY29t%2F%2F%2FaaFuZGFsbEBtd3B0YXguY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9a469758,0x7fff9a469768,0x7fff9a4697782⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:22⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3804 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4724 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4440 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:12⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=904 --field-trial-handle=1912,i,12055669671664562013,16458205224031117894,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5eaf291d3dc62efd07c658e8ba6563825
SHA12edd90e70831242ff16ee26974b625440e9bea7f
SHA256ccba729a74f123dd83f8f78322bd0e0c55bd90fc6fc8ccb700159fc024065afc
SHA51221f515d7f4cf1a61fdc54a78c59d45624499f5755d5cce44cb8a848168bceeb22c041c375aa3e4b5e4a50b86f4b9a59e31e6dddf4b921d6ef46e6c27a3af8ab3
-
Filesize
120B
MD56524cd5f033bfc7b8654bc6120e6a370
SHA1a3504772cccb799084671088c92ac6a9b01e4217
SHA25620517c83f4a55b6fc26951cfcecd01b5d573d833c8e230546a3686146018fdca
SHA512706105b1741b5781bff4b7653d1f9e6b1b8ec6816dc4147f7e5de32b42fd755985d3c762201c6ec6d3b8d0d51db55a780145cfb49b439cff810424a9079e3af3
-
Filesize
2KB
MD57cbd84ea5a3465d36c65c2c6f16e0c3f
SHA19aafb6624d5d783545d675d3a7910d2ad52e90c6
SHA256a5e057a067d21b8a171733d8f994a66b49e860d95024f0e4c0e1474d30cf33d4
SHA512abebf33befee6fd449d2363e6586611b0f0cb7a72455eb84103b1cce4d45456cc5e736817e84d5e4873059f71bc66defe1b0be404db0329fc0985601a09af000
-
Filesize
2KB
MD57a00ad6faa2549e0cbd155704027c0e8
SHA1c15eb2ae49080dff1b6ba60a3ad2530898ced42d
SHA256e340a2765869f3297e898027405328d092ede0aef932dea6b655a949baf4a81b
SHA51265d87628530f4a5c6505256df5bc3497df9a619dbf3510866db677c768347bf192a0ab0abe1c00a46b140f5f4016f280306a7689165c94db912e445795590a42
-
Filesize
699B
MD5cc3c48a5c2d81d07891a8b0fcc0ffaf5
SHA1df0dbdbb2346faa89163f65ac81c4d13d4fe44c1
SHA25623c7f4b8375039db8cd73efc9b526adb275f9d4e0fe6528be3e943ef6cb52ac5
SHA512f93e844051f4685693c3b7f26db6c8e3880c9d8186a49e30056977a8a3aa8c16a2dc1801477f9ea6771a0bf062393f5bf355d5ca643e5e81e47219b7c161b0a2
-
Filesize
6KB
MD56e159bba7a9278601c06a6509accdaab
SHA1ba126aa7002a2ab64efb632cfcc9bdc154ebddec
SHA256b0336d11b799614621c1c1c3a45454559df32594c94e0920dc71a6d698133c42
SHA5127257eebdd22aac7a97164f156b7921845e89dd986faf37b54f491899240d7eefb0b507ae5fafa89de70fe77f7e5ee3d4c6d13323ad86a580cd5bfe5d699f6203
-
Filesize
6KB
MD58a0bfc35027c865c8e3d754dbfa9d414
SHA161c08e184368abe926441ca0223d1d920cb974bc
SHA2561c7d5bc200601e651ae46dbfc579f161daeb424d9357b1af1a9b5a9dbafe0479
SHA51221c5c8537fb78d8f91fb9d6e2ff94998c8dc5ebb44563fce7336cd73dbac447ce8965bbdf8d5f63620b47ebe0c135160e281d103b0f3c816a7d72c9ab39006eb
-
Filesize
87KB
MD5617eb2ca5d43fe241609d6e51a7e9d90
SHA1007189161f89a0612570e103b99105cf2f130fe6
SHA2560ba71d3a31b9663fcf5a0b8eea1ee5cc088e93cd54cecf894158bf8e8df5f550
SHA512760fd1c6946a9a8c3e152e537557061fd9a1387b53217c02f8cd90be1886c94c8632471b76e570cdc87d02d5b380e60c9cdf2d06db85f0e5f8de6910e330ca96
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd