Analysis
-
max time kernel
1800s -
max time network
1692s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2023, 16:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://smtplink.usssa.com/ls/ click?upn= WSslNwXrfTzmOiygdbhyJ- 2BPVqH3chGjhvFAtaAarq2WLEVJIOM 36STmSQKqXf36IkIzO8MIL- 2F78yyx1LT0FtLFf01C8gxMzR9ClAf O5qLHI-3DQh01_ ClnnJPpaNMB6ZImbSo25OC284P4npw ENDWmxliDM4CctIImJ1WvdQJYPGwH2 ZnFRqykrw2SUWWWHhbQtSpofLcEC2M 2JkAyw8AgkEaRF87G- 2BKHiCBNAAFP10LSbP- 2BqUiq6BebmArj4genpir4qeM- 2B4k4BabPR0ZcCNgQiesqzaoWp097i TRuHWq9F3oBw9fKUHHSZjeEWrs8zPc Npoa5UQ-3D-3D
Resource
win10-20230915-en
General
-
Target
http://smtplink.usssa.com/ls/ click?upn= WSslNwXrfTzmOiygdbhyJ- 2BPVqH3chGjhvFAtaAarq2WLEVJIOM 36STmSQKqXf36IkIzO8MIL- 2F78yyx1LT0FtLFf01C8gxMzR9ClAf O5qLHI-3DQh01_ ClnnJPpaNMB6ZImbSo25OC284P4npw ENDWmxliDM4CctIImJ1WvdQJYPGwH2 ZnFRqykrw2SUWWWHhbQtSpofLcEC2M 2JkAyw8AgkEaRF87G- 2BKHiCBNAAFP10LSbP- 2BqUiq6BebmArj4genpir4qeM- 2B4k4BabPR0ZcCNgQiesqzaoWp097i TRuHWq9F3oBw9fKUHHSZjeEWrs8zPc Npoa5UQ-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413439056205142" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4348 3460 chrome.exe 19 PID 3460 wrote to memory of 4348 3460 chrome.exe 19 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 660 3460 chrome.exe 76 PID 3460 wrote to memory of 1336 3460 chrome.exe 72 PID 3460 wrote to memory of 1336 3460 chrome.exe 72 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73 PID 3460 wrote to memory of 4340 3460 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://smtplink.usssa.com/ls/ click?upn= WSslNwXrfTzmOiygdbhyJ- 2BPVqH3chGjhvFAtaAarq2WLEVJIOM 36STmSQKqXf36IkIzO8MIL- 2F78yyx1LT0FtLFf01C8gxMzR9ClAf O5qLHI-3DQh01_ ClnnJPpaNMB6ZImbSo25OC284P4npw ENDWmxliDM4CctIImJ1WvdQJYPGwH2 ZnFRqykrw2SUWWWHhbQtSpofLcEC2M 2JkAyw8AgkEaRF87G- 2BKHiCBNAAFP10LSbP- 2BqUiq6BebmArj4genpir4qeM- 2B4k4BabPR0ZcCNgQiesqzaoWp097i TRuHWq9F3oBw9fKUHHSZjeEWrs8zPc Npoa5UQ-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffabf269758,0x7ffabf269768,0x7ffabf2697782⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2780 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2648 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:22⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4080 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=164 --field-trial-handle=1844,i,7461993622247930137,10904920600197263830,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c36f00f7dc095ebda357b2e25cda5591
SHA1e72ef16fab23741d7458cb47d14b9bc126889d40
SHA256c0f09ac2a1f1efa2ededb44b198ff2a05cc93fbbcc7b23cbbd992c60d18b354e
SHA5124f63290793f481e0cc8ea84c9be93603a7e7ba4c038fa7119892087cbafeca9f1cfdf3ecad616e20af05b2ad6c9b67837d19cb81f7ae9f05a87e01834b48fd74
-
Filesize
6KB
MD5efb615b12b9958bace5185ddea05fd5f
SHA1845a6369e426ae7214e40f4c9d97d1e4193b7c8c
SHA25628752ab2b6ced1c30f071494e999883ae9064c7e50411266ac997d552ca35ab1
SHA51286d2780360bb5da3c01a8f4226904a90c1060cf3f6a2722e8a8a69d0f4bf1037a33860c9ba230d0f5d50a54a6ab04d25f3aa4dc76863676b95ab1150bfc84d14
-
Filesize
5KB
MD5261322e9888fc2ea587932572da4ddba
SHA1d43aa1aecf69ba158d24fc8fa32a3b82025be9ed
SHA25644d7d1ebb06df2009b9f473e2a3671bb67389a2d9ef20e5775b46b639da732cd
SHA5120fbbced3bc494d7d790fc53350d66fcebdc685c34b5ad4ef98e74f80578c72f27c6f1ec6f6fb0c2c4b313ada8cc8d81e61f81b2cfcbe99b515e8b83265ff3fcb
-
Filesize
101KB
MD55532a61ed0a50011d6a6e85c8a679c51
SHA1c49a7db762f1c69a879fc0e1c5feb2fcca5aae81
SHA256397cecfd8e7f597556035516ae5a5ee020215a15c1cd151bc08163f2540977d9
SHA512730ee5e22c3e9ef06407ecb7797ac03e9c74669c6e494becba9e01b85f1689e24aacaeb2e262ca9ff2457cf7edfce48d2aa12a16a60ca1c5d7bd3ad0fbf0441e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd