Analysis
-
max time kernel
159s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2023 18:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://click.info.mailssenders.com/unsub_center.aspx?qs=73d6419a3726ce3617c2d2b419f8c89853b4f812a02ed385e42517a1e25cc5bc8a811565cce11da2c94ff3a453cb99c2cd5889c89fbee8e03c0b6691981f66cd902552e2820e7c00
Resource
win10v2004-20230703-en
General
-
Target
http://click.info.mailssenders.com/unsub_center.aspx?qs=73d6419a3726ce3617c2d2b419f8c89853b4f812a02ed385e42517a1e25cc5bc8a811565cce11da2c94ff3a453cb99c2cd5889c89fbee8e03c0b6691981f66cd902552e2820e7c00
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341802030282693" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 2648 chrome.exe 2648 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1536 1096 chrome.exe 45 PID 1096 wrote to memory of 1536 1096 chrome.exe 45 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 3280 1096 chrome.exe 88 PID 1096 wrote to memory of 2432 1096 chrome.exe 89 PID 1096 wrote to memory of 2432 1096 chrome.exe 89 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90 PID 1096 wrote to memory of 1700 1096 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://click.info.mailssenders.com/unsub_center.aspx?qs=73d6419a3726ce3617c2d2b419f8c89853b4f812a02ed385e42517a1e25cc5bc8a811565cce11da2c94ff3a453cb99c2cd5889c89fbee8e03c0b6691981f66cd902552e2820e7c001⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafe379758,0x7ffafe379768,0x7ffafe3797782⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:22⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3636 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1868,i,18348658933998426547,15792835010460500126,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51efb78e1362ea32c60ae4b8f292ff1b3
SHA1b3d02531cbd41734832d22bba73eaed1b76e42a5
SHA256c7201e3d6a609a94c6eb2bf2b0f953cc0f07d7b444e9906c5b6ab21d060cdd94
SHA5129bd5a2b37a9358470d23fee814d5e7fc6ab7c2b379ff1dfe89fb821a2f3d9c77d8063d4ac34278807f457ee87bef4cff2a048fc31326381efd07fabef4cc3d46
-
Filesize
6KB
MD5aac51567b74ae26e0f9d3112bfe37c80
SHA12ba0387a115a834082af592acda0b1a0ca4470a6
SHA256a055ddff6f712802b542f74e4c3b243c6c39bf352909f30a9c6890132fc92454
SHA512908e61ca11b38895080d8c5a81fe4a2ba03f08524b10e2a43a399ad59da343c5aee7a51f7deded9bcc5fd027e826190bc905423f9735a4cd0485903f4045cc8a
-
Filesize
87KB
MD53de703b0bbb337ed9ceb6b5c5dc41075
SHA14e80650e1af01a8811a4e97d386907ba72ea831c
SHA25662bf7461ca9c3bbe2004a5487f318ef3729721cbdb924188b03643597259e445
SHA512e5c63052331e574911f5a5475df1258d0dd67cddf25e6d5db8be27fea9110d9117eba099b769644730342663f47f8f8e0a0d6049f5665264d92e89f2359b00a8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd