Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 15:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.dickssportinggoods.com/H/2/v600000189f94a07b08b4804f4bbe5c898/0ca45cfa-7e82-4dd1-8f86-4c408f6e3de0/HTML
Resource
win10v2004-20230703-en
General
-
Target
https://app.dickssportinggoods.com/H/2/v600000189f94a07b08b4804f4bbe5c898/0ca45cfa-7e82-4dd1-8f86-4c408f6e3de0/HTML
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133365881263176585" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 1936 chrome.exe 1936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 3616 2792 chrome.exe 81 PID 2792 wrote to memory of 3616 2792 chrome.exe 81 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4320 2792 chrome.exe 83 PID 2792 wrote to memory of 4720 2792 chrome.exe 85 PID 2792 wrote to memory of 4720 2792 chrome.exe 85 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84 PID 2792 wrote to memory of 728 2792 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.dickssportinggoods.com/H/2/v600000189f94a07b08b4804f4bbe5c898/0ca45cfa-7e82-4dd1-8f86-4c408f6e3de0/HTML1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2aaf9758,0x7ffb2aaf9768,0x7ffb2aaf97782⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:22⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:82⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1876,i,13960750231139028955,9897674193293545426,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2508
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56cdfef574781fd36c9d60e3a320c4e90
SHA1271d088dac09c4f1f9485ff92ef9e4f0956e100a
SHA256f6c90a1dc660142be64193ad800ca44615aaa2ce107213979a9687b16e3b6251
SHA512dc24dcc552ddcdc8185b6c7ae20a0a28ada47fc64bf305325c5f83e3eca48474f1294022f9c7316647af3662e2b6ce19e42f781f5e2c860e27b933debe491b60
-
Filesize
1KB
MD53512b3c78a356c8c24fd5561d9d273c2
SHA13e6e53d2ec992625f57ca970532fde8631b16641
SHA25678b56c51447affff91d578e1717f076b893dfeadd6d3e2f2ab050dab5dffb595
SHA512e6bd83f8e0a9881728d9cd86b0ca93489cfaf9db5b496cd9f1078b044b3e9a7a40f6ecf36939b0d897bee6e7e75db57c26b204f1588d77b4461b82fe2711d601
-
Filesize
536B
MD556dc6b836475738c1b25672e76257998
SHA1551b89304b577732fe0cfb888d0c3535e8d99303
SHA25617a4281ee3ac12ec1e9ece2e0419abf95ab43a551a89145ab741e9ed94e0e9cb
SHA5128f37da05f776b45b92e8d0d9a42deaf52acc904a0a56e2f88e8ac7e65be0f53ea0b21d387c04016dd4316e11beb4a2385f19043aa387bf143d4dbb82bd071210
-
Filesize
6KB
MD5aff0eec19e0ae9927cbdaeb29001b388
SHA1868b1f28d1745643b480546d4712ba8f321b5029
SHA256a2c73e48092f0e554b49b1782ca1dd9d9708511abc52c5f1af96e2253568a831
SHA512fead221e92100c159bc88f0f59cf541fed9bb8309ff0386b68cfc1201c8afc7cd2fd5a1d71168a877fdffd250009658e548a25b614444b1e7fe92803ad40c9b3
-
Filesize
87KB
MD575dc54ca02ed94af8421373be92001ea
SHA1c8acb1edfc18a0e5b7b1df75e8090c8f64331665
SHA25667e3af4f96a4d427beec97c446e6c0680977635b48a28a864f100d026e4e6aaf
SHA51204c5353b5af61889024c48463d09e14fa364aaa8b0193b24cc71c8771f040b3715f9d8679dc21a9e84cb32a13d5091f15082a99b1d9f21572016a79e3e509ab7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd