Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 06:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://open.entemail.salliemae.com:80/track?type=click&mailingid=0&messageid=0&serial=1&userid=WlUYVz0fGwnsJZKtRWyta7tvsvUPLzeVz1kgSkvjD4vqUpKx&eid=1654404701&targetid=0&extra=SLM&&&http://oconnellstone.ie/sow/auth/386oit/ZHVuY2Fuc2hhbm5vbkBqb2huZGVlcmUuY29t
Resource
win10v2004-20230915-en
General
-
Target
http://open.entemail.salliemae.com:80/track?type=click&mailingid=0&messageid=0&serial=1&userid=WlUYVz0fGwnsJZKtRWyta7tvsvUPLzeVz1kgSkvjD4vqUpKx&eid=1654404701&targetid=0&extra=SLM&&&http://oconnellstone.ie/sow/auth/386oit/ZHVuY2Fuc2hhbm5vbkBqb2huZGVlcmUuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407870365463153" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3676 1608 chrome.exe 61 PID 1608 wrote to memory of 3676 1608 chrome.exe 61 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4672 1608 chrome.exe 87 PID 1608 wrote to memory of 4304 1608 chrome.exe 88 PID 1608 wrote to memory of 4304 1608 chrome.exe 88 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://open.entemail.salliemae.com:80/track?type=click&mailingid=0&messageid=0&serial=1&userid=WlUYVz0fGwnsJZKtRWyta7tvsvUPLzeVz1kgSkvjD4vqUpKx&eid=1654404701&targetid=0&extra=SLM&&&http://oconnellstone.ie/sow/auth/386oit/ZHVuY2Fuc2hhbm5vbkBqb2huZGVlcmUuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe54439758,0x7ffe54439768,0x7ffe544397782⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2456 --field-trial-handle=1784,i,7945883237935803907,8412967399243296380,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD56d47bac50ebe1ffe815ef7521f7d4a26
SHA1c9b85b4c47be14b4e80df002ce13537857f6b00b
SHA256f21ad86011c041c921f360871fd3fbc954dbc27f0583a87c717cb6ddfd6eace8
SHA51242ca1c4fab2ba3d8a9abd85f225b0c9ec439d027a3ba86a2755b20fe4cfd78cf4b9526723b9586f8cbb78d39a1d8882ca23ace98de0944780a563efe6644fe55
-
Filesize
2KB
MD50ab14614ccdc2a528d2e3d7c5504430a
SHA1bab70474146579ef5a7318c6b2547e7c4dedf0d3
SHA2563f557b5853d126eb89453321cb679de1e686a34e700a09f05d8d55716d23ab77
SHA51267ce458264a7ec5adaeb173d8aa4227e1551f56d60aaa45edbccb197940c316703bb5557b822d1a684c3e536309f2f34053e93a796ff6a13a65d277d40c91085
-
Filesize
539B
MD5d267cbd51e4160359e70f8b0fd4500d4
SHA1993a21ef55fd091dea47b3a3cd3db7dd21ec3361
SHA25652c6ff5bbc209a4bf3be668475c05570d6981a1a16ed148314ddd6451804d930
SHA5122b32c86282f006b9d05a390532fd75f3659dbdbf6eba89e906ce04cd9d0b7dd4268c9b3a4e98e5d92a2aaa26328aa12d36daf8ec2f520ade8bcdeb6f5b078f32
-
Filesize
6KB
MD57c0dc7aa05c465d7eb4073369d59e3cd
SHA1b47f078ffe206faf3647615a4fc5a9229efe4f36
SHA2561d66b93785c93f9a32ef9b589eb5da0c4361d93fced69f359945098c41661f3b
SHA5129a9584a170e82991d8591959fac8ed3f96269a7eb9869ad1ffac5c10143251a2e8a06ce5f5fd89bc2ce90f885b29bf7c63194e9ef52563a84862af8c5ee30304
-
Filesize
101KB
MD53dc81207d930db232f44dc76bf22561a
SHA19cd9b48f8a5e3b24adbb0ae3847fac54e85ca759
SHA2561f468619a55619427be2e18f7cafcf182d011dfdfc847c37854df07642bb0d1f
SHA512e9c7a7dfe23a371e893425803470fc22cb62852e7b7ce451d0762dcda112712170e8af6f3c87b6da4a1e70811166c7009f7c47027efa6731adb8c6bae09767d0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd