Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 11:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wizink.intercom-clicks.com/via/e?ob=jClno0EkfRw8bvwPzv8sC6QLO6iy7sQ%2FjJMGyBDEwz8%3D&h=a449c899a530279f4aaa95d355722cfa814bd9dd-bhdqzgx7_preview40729676
Resource
win10v2004-20230831-en
General
-
Target
https://wizink.intercom-clicks.com/via/e?ob=jClno0EkfRw8bvwPzv8sC6QLO6iy7sQ%2FjJMGyBDEwz8%3D&h=a449c899a530279f4aaa95d355722cfa814bd9dd-bhdqzgx7_preview40729676
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382992649996061" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4400 3168 chrome.exe 83 PID 3168 wrote to memory of 4400 3168 chrome.exe 83 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 3396 3168 chrome.exe 86 PID 3168 wrote to memory of 4828 3168 chrome.exe 87 PID 3168 wrote to memory of 4828 3168 chrome.exe 87 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88 PID 3168 wrote to memory of 4652 3168 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wizink.intercom-clicks.com/via/e?ob=jClno0EkfRw8bvwPzv8sC6QLO6iy7sQ%2FjJMGyBDEwz8%3D&h=a449c899a530279f4aaa95d355722cfa814bd9dd-bhdqzgx7_preview407296761⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4e0c9758,0x7fff4e0c9768,0x7fff4e0c97782⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:22⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 --field-trial-handle=1904,i,16704528959402786391,4779535746148423951,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5de1b1379e0290a8e5ebee974e57e423f
SHA19996534a3cff62a7d16c04ef13a140502c6d64ae
SHA256ea7c8c994be50f0c7daec1e57b3ee64464427639bac81b08ab38372c4df55d62
SHA512ab54db207e662d1873974f96a107a316d315f1f046f5ae4ebb0102e08df2748bd568d2ad278845b28aab81482033e8a337c5155e1fb002114a5218566da9d91f
-
Filesize
1KB
MD52330b50dda940dedd650a60c6f165e1c
SHA10580770af031ea84fbe8823d7a7f95f5f12389a9
SHA25636cb2bcf82aecb582967d824aa5743aeee701ea1a278b35f1c095153b138d0c6
SHA512745ba4a1cc69b78b97d7ad0a7d1d6567fd9e2b9f91f59380ba257e79ecac381280fbd358a30773fb9035f2f9aa5e61dbec6688ba1d42b8d9516e158427d34abf
-
Filesize
2KB
MD5af61122a05762345f4f5b01e5f033772
SHA1870d1a18e65dd05d1acf9b3494562c7a83d682d2
SHA256f78149350dccd3f3178b1c8fce8e6806990d3a11079caa5796298bdbb9f27577
SHA5125a829df07b8e4841d5f669c4be54141fc34528470ea852f8e5ac60021159cf4068b079367ebc7267aa371e8b9b50b0a766eaf04e9e77155b01242a6055d9bdee
-
Filesize
872B
MD503a1e6086ba6fd80565c9b562f2544a8
SHA1721bc79119d6c2302f0f0899679c925a8f229640
SHA2569195fcebef4b483783d052a5639eb66d69d09c1e2472cacfc8396525b80920c0
SHA5121257dcebae9988a98e1b28ca4b6b5b09643d92e96b367182cf5eca986d004909bd10844bd26996165ea5c6b26bae74bb4351d6f2ea1a30e3e7758b00c50c842c
-
Filesize
6KB
MD5b54f0e9e172ab3425f55f3639e01b5b8
SHA186bf4d6a7c40e2ae3499a5e2235c4bca82e44aee
SHA256979c264fc84849b8b4738f91d93966f61901d78851511dd4830a9b054cca0c24
SHA51263dfb544da241bd04c84afef144e73b656322d63fa9ef2626856b8f9395ab0e4de50e69d76de636f7f6a196dd4d3b3c76b583ff419d2506d6f2244bb34fb4f78
-
Filesize
100KB
MD5f4d956ed2d0c1870b74c2e89397c2151
SHA17a97f338170484485ee6ba51661b6b2f000b2f86
SHA256707c5e450219d68258079d697388fb398ff816b9d3f62ddc8fada73fccaa88e9
SHA5121837a6ecf1885ada20cc1385e65e898bbd80a4a006052bf52ae1a419f3d2da66b2be51b92b556c00991eb5547c35c824f22bd35733bcf13f49e593aceebe2577
-
Filesize
99KB
MD5258238f34b27d5531b28187329496095
SHA1d45ec7bfe392ddbb1006409393334f4a83b1544f
SHA256b2638117754948fa9de14a8cb74db78cfbbe99b46e2e123a3ca814643096a552
SHA512fbc8f4c4f336c2121208780b23cb0b8073d8a618ec5679952a30c50046a0317d4e93fe7b53692f8e84fd218a92ec31e3c3495ef58360d3e9bd5e3cb6e27d1a4e
-
Filesize
99KB
MD515aa76e82da0bba44e41701121c158de
SHA10d6d86532119ab34b6358b6bf5762b1a01322872
SHA256a4bcd7ff4dfa79246af415b458d66b52fca9dd9031ecc2c7bd13aa1296f050b1
SHA512d76a02434afd5797dc4d5bb6fad793ebace6e0045d661d8d9a8abdcb532b813e318c74dbacecd30eeb258aa045a883743a66095fb08a3303e98373b03dd14349
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd