Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 03:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://westchestercountryclubfl.cmail19.com/t/n/t-l-3fe7cb8d454d11eeb8edd2627805b52f-l-r-r-l/
Resource
win10v2004-20230703-en
General
-
Target
https://westchestercountryclubfl.cmail19.com/t/n/t-l-3fe7cb8d454d11eeb8edd2627805b52f-l-r-r-l/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133377523064954455" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4296 1612 chrome.exe 83 PID 1612 wrote to memory of 4296 1612 chrome.exe 83 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 4592 1612 chrome.exe 87 PID 1612 wrote to memory of 3752 1612 chrome.exe 86 PID 1612 wrote to memory of 3752 1612 chrome.exe 86 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85 PID 1612 wrote to memory of 836 1612 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://westchestercountryclubfl.cmail19.com/t/n/t-l-3fe7cb8d454d11eeb8edd2627805b52f-l-r-r-l/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4dc09758,0x7fff4dc09768,0x7fff4dc097782⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1932 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1896 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:22⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4976 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5028 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3260 --field-trial-handle=2228,i,1457043987694118151,6883899529310403093,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2796
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5072c9a33c9b133b6ad251b28034baa5d
SHA11f6f4a4b65fedbd59031d036167ec1d8e0d281e6
SHA2562c197ac2c9d79ef69c09bd6a44f4341a43704e632f9e405ff8402affa02ede40
SHA512f0a2e9599835fbf57981e2440c6a5419a79719fa1197d8fd9f7812fd70e1f112535c40a35c9d8575a74ec6b8918cd0f1097276a6a36e18435f09013688c4e0e6
-
Filesize
1KB
MD58481d8f6e5c8ec596d96d684bfcbe6b8
SHA1a01efceb6f492b496eb47717a28be7707c0ed7cb
SHA256c2d8d33389eb96b6d22a990d05f649044f0281f3ccef8259b07a60b4b2060202
SHA512d8d3b1ef7d0d85f121fd8d5921f4f1277a7e9abb816ca914e92681fbf8fa1d57e5e67f45c50778a3308a9cb18700745795f9908e91e087bee2a644c004cbe73e
-
Filesize
539B
MD5518c0d6ff14c5e28d28ef315cabe0f09
SHA1358232b8abc81a9b68652ad22cc0c2eccabad538
SHA25699a760fe81ce3a36844b6c129f6b583c52e0b0507abfa4b84f3d92978a94b1d8
SHA512fb191db8528c62fa64e08031add34a5c7d09b32a1c1d00939cf3d23eaffca1b2b702db9a2a5e369e0fc5b6fc5bdb0bc0778a395c74fb42bc29795579349e7eb9
-
Filesize
6KB
MD5a9e9a10dfe648d6964ba5dd6293b587e
SHA16f32a71a069cb8eae5873c27d3f9308654dbb85f
SHA256236fc4799ed41b3139ef5bba7d6548bbdc3c59bbd8dedc250ba765418b7884c0
SHA51217a8dc316c6fd8fc4f614d04815a2928455baeb70403a7c43c814548526961398721552371b5cd33bcd845ab96138bb3a93bc44d5e51477c8fd50336e6fc25f8
-
Filesize
87KB
MD536af934f738aa7ac28b9abb62fcbcddb
SHA133299d93b0a402ef879d9313acd3a1b02dfbfbb7
SHA25650d157680b3b7f25730e3ae4270df6ced11e4267f310d7fa6ea16635b71ec0d5
SHA5129790c2e3e4455646ca686663f736afd21372ed07e742ea61f5c2d1256d3f7d0dcfbdc6fd51857847b1de6065d068aecceeceac7ac77bdfd9e7a9ee053b453031
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd