Analysis
-
max time kernel
35s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 17:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://insights.metabolon.com/UnsubscribePage.html?mkt_unsubscribe=1&mkt_tok=MzAxLURBRC03NDIAAAGOn-NenAwMnefb_7xQIUOaE4096Ya0YHpbhXpsJKPEFHrVLUHvXNsNjjq7p1Rqr6xrXgZqU06gqYPKRpBuUP7FijuQU-euGeEaQMBii2x8PRLqVkvk4pw
Resource
win10v2004-20230915-en
General
-
Target
https://insights.metabolon.com/UnsubscribePage.html?mkt_unsubscribe=1&mkt_tok=MzAxLURBRC03NDIAAAGOn-NenAwMnefb_7xQIUOaE4096Ya0YHpbhXpsJKPEFHrVLUHvXNsNjjq7p1Rqr6xrXgZqU06gqYPKRpBuUP7FijuQU-euGeEaQMBii2x8PRLqVkvk4pw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410020957377118" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4428 1248 chrome.exe 72 PID 1248 wrote to memory of 4428 1248 chrome.exe 72 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 4208 1248 chrome.exe 89 PID 1248 wrote to memory of 2688 1248 chrome.exe 90 PID 1248 wrote to memory of 2688 1248 chrome.exe 90 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91 PID 1248 wrote to memory of 4676 1248 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://insights.metabolon.com/UnsubscribePage.html?mkt_unsubscribe=1&mkt_tok=MzAxLURBRC03NDIAAAGOn-NenAwMnefb_7xQIUOaE4096Ya0YHpbhXpsJKPEFHrVLUHvXNsNjjq7p1Rqr6xrXgZqU06gqYPKRpBuUP7FijuQU-euGeEaQMBii2x8PRLqVkvk4pw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8dc059758,0x7ff8dc059768,0x7ff8dc0597782⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:22⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1888,i,8071762557597751678,16874616253436833346,131072 /prefetch:82⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD57b46a7a29e53c96cc65a602322acd6f6
SHA142d450dc984a8f88eea0a436c93e5ecc2be7c979
SHA256edc85ac7da871c1d88715e3deeee2dcfe07fb59793a40a281fb7b31d67381404
SHA512156d7794eff8aae8607da90321ba737846b4ff154f9a4cabcb4bd0781b840f09bfbbe9d3ed4230aba8905df85973c4089572aeb6d81e319fcde681652684f4e1
-
Filesize
538B
MD504b738ced68777c1a2508bef2957bccf
SHA1902621dff7c6c2ead170e3f649cc76b8542ec1e1
SHA2566b4be9dda461779158b12e5becb0ad66f593dc312119ed06eb79e24905803375
SHA512c9b2e0f1ac84c24200732722339ab51c7f2df2a0f84c9bce9226f2276bb7ac226c1695e167117fc37bf7cf3b40cd8f15556f63df917a6a3ed2b872f329b2bd37
-
Filesize
6KB
MD53f296e2df44541fead0c9191f8e3fec4
SHA1a291a740ebca1229fa2da7daed7c1970d84288d8
SHA25670a9e848b6d061e2ae338d97a1e2449daea1424516b87656c9458a26ebd02ac1
SHA5129dccdd92d972d4e0c3959515209f05599130dfe1cfa5f2dbec6d7945b23d3387ae5da7976e1712aae3df1ac127d85246223935b45ba166261c87af209ce9c464
-
Filesize
6KB
MD58a619de57c46f8dc357749f4a38fac14
SHA117dd9e8b504c6322c0257e2ffa596247f45ed0bb
SHA256419df3b8fbfb28360433f8f2a7b66538f2846c8124046fff76fda642fd7e0582
SHA512043b4501f7ed6b6bd9e6736645d56b7c25c6d19fb8e4805c0ff75e125ebe10305ed78d9206f33f07438a677d197cb041d4dca8e186b4883e9506b2921d1a1d17
-
Filesize
101KB
MD54efc9bd98641a88ff6fcfdd54e896670
SHA11ebdd5f07429f016cc5270275cb9a4a96fcee88a
SHA2565a5eb14e66a9e78a58727edf4adf1e4eb7dcc50de77d09da280f658d6420bf58
SHA512c70d2d10cb304fa9e17e038900db469d654618af727bd3edf0ec6b41159f7cb5c231bd8ee5d4a7392a613a621ce93c828b3eccfb17a16c630fb2093daabbc304
-
Filesize
99KB
MD591f811829d2df99afdca114fd0f262bd
SHA15b7dff52fdca26afb418502c0d612da942b7d4d5
SHA256c17a081a4e7824c4693af6c8912c3d6f342997cf177432aa87e1f9af24eb1ce7
SHA512aff1206e5aa86b0176813bc76d888d81cfaa86e81aacdb32f01c799b19d5f4e6f75298f3f1bcd0d4954ec34baab0110e497343fa852ae514e06a5cef5f5df2c8
-
Filesize
97KB
MD5f17515f539cf64785db209b3b67c3149
SHA12f079acd2e632724eda8fa1b8c12562a63b76265
SHA256f203372571fbe18450b940199e601d48c4f7e1237e882d0f77e5e47c7ede0e41
SHA51221bf3d8e978e71c4182853c9248e701875111e1e02a84f910abc7f082b763e62fe75c4de5a54f83070100f7ddd583f8ba54422422ac0f5d99c28976cca7b4e11
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84