Analysis
-
max time kernel
299s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.pardot.com/unsubscribe/u/961512/5a99a899fa61be6d47c5d297ee9a156ca7d6e9e2547b0ae05a235bf94fa6d185/411113332
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
https://go.pardot.com/unsubscribe/u/961512/5a99a899fa61be6d47c5d297ee9a156ca7d6e9e2547b0ae05a235bf94fa6d185/411113332
Resource
win10v2004-20230703-en
General
-
Target
https://go.pardot.com/unsubscribe/u/961512/5a99a899fa61be6d47c5d297ee9a156ca7d6e9e2547b0ae05a235bf94fa6d185/411113332
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372775086678044" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 788 3464 chrome.exe 81 PID 3464 wrote to memory of 788 3464 chrome.exe 81 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 4712 3464 chrome.exe 83 PID 3464 wrote to memory of 3064 3464 chrome.exe 84 PID 3464 wrote to memory of 3064 3464 chrome.exe 84 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85 PID 3464 wrote to memory of 3920 3464 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.pardot.com/unsubscribe/u/961512/5a99a899fa61be6d47c5d297ee9a156ca7d6e9e2547b0ae05a235bf94fa6d185/4111133321⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2cdf9758,0x7ffe2cdf9768,0x7ffe2cdf97782⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:22⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5376 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3460 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3832 --field-trial-handle=1876,i,8806893479725366111,15301783204651654490,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1576
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c47a7de6b557c9b2002ad5547893886e
SHA16354c3641c3e7b6ddc64937526d68faddec6c8ad
SHA2566c5467edc5ebfa161dbddad6e66bbad11a9bff19a9cba0fdebf408db590aee12
SHA512cc21d0251f3ea4c2e35bdab176575ac47d880c21ced05ffab8b35df9dfa0ee4d6ff4fb8c35156c5d69fb1b8a07ac2950a48d4beec1171fb8ddbf74e6c14980f0
-
Filesize
6KB
MD5faa151fec253e956419260dfa2e4720b
SHA141a789be2143d7886739499858e579c69b7a4c8b
SHA2565f1e0246f0cf92d05e0561a5c5280d92149aa637ecf3ad7a2596db035a66fce4
SHA5129a9151076ccd444f37c719b61ca8200cbb32bb687c3bfe68869ad6452db448bfb6eab63ebe4b7d38cc003ffb9bd4b4d258ef84b7922c1c7df89e661bbf8fb2e1
-
Filesize
6KB
MD50771062aa65a17bf2f76885d67e996d6
SHA18b666d52b505481f3309c112a3913539d78e8fde
SHA2560faf2730e026f5e867680e655d4f6d0df901f7a44f00af3f1c6c3ab158d4d12e
SHA512847deff477f300b92df9990cd76d901fa4a5fb82d665df668b695cdd65c82a2702b7dc837d0df959c390d6b45d3cc41a7a6aa5d06f8f169a2ab0c1c59901b500
-
Filesize
87KB
MD514589f073fdfd85b4ac2613ce3a6186c
SHA12c7a82e88fd67478862653895893becd8f9d4296
SHA256dbe731a85ff015c64d758b7a89e8e29c32224f2826e7d2e88eb30869bcf93d77
SHA5124f7b3345f2afbb96cb843540d43ccaebe580ee959d58cf413b2c806743bc608d8abdd53fccf807717f65ff4ce6cbc37ffbc7b2e4001f8e42877144c45be1fbce
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd