Analysis
-
max time kernel
1151s -
max time network
1094s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03-11-2023 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u36381545.ct.sendgrid.net/wf/open?upn=LkQfdqPuPKAIeJV7jgCZo32wWTp270dL-2FaDYoeTihzBcj15iKVAA7Z4vJ-2FHhknJW9SInaUAD-2Fh8Et1vElKWBnEmxGO74kaIf99zj-2BH70-2F2bN4sqqm-2F3ceXyKi7xMkD8-2FE1awaXO-2F-2BXMM-2BiKeXo0qjGAVJipJp7kW4ZhqeI-2BVzlDiSvUdBhNiDSOkkEGz-2F-2BsjAlIub58dVR0NI9bc3HkZw7EcYk-2F3xGjFXEn0meCGguI-3D
Resource
win10v2004-20231020-es
General
-
Target
https://u36381545.ct.sendgrid.net/wf/open?upn=LkQfdqPuPKAIeJV7jgCZo32wWTp270dL-2FaDYoeTihzBcj15iKVAA7Z4vJ-2FHhknJW9SInaUAD-2Fh8Et1vElKWBnEmxGO74kaIf99zj-2BH70-2F2bN4sqqm-2F3ceXyKi7xMkD8-2FE1awaXO-2F-2BXMM-2BiKeXo0qjGAVJipJp7kW4ZhqeI-2BVzlDiSvUdBhNiDSOkkEGz-2F-2BsjAlIub58dVR0NI9bc3HkZw7EcYk-2F3xGjFXEn0meCGguI-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434964172956973" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 4796 chrome.exe 4796 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 228 1356 chrome.exe 56 PID 1356 wrote to memory of 228 1356 chrome.exe 56 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 1712 1356 chrome.exe 87 PID 1356 wrote to memory of 2692 1356 chrome.exe 89 PID 1356 wrote to memory of 2692 1356 chrome.exe 89 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90 PID 1356 wrote to memory of 1816 1356 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u36381545.ct.sendgrid.net/wf/open?upn=LkQfdqPuPKAIeJV7jgCZo32wWTp270dL-2FaDYoeTihzBcj15iKVAA7Z4vJ-2FHhknJW9SInaUAD-2Fh8Et1vElKWBnEmxGO74kaIf99zj-2BH70-2F2bN4sqqm-2F3ceXyKi7xMkD8-2FE1awaXO-2F-2BXMM-2BiKeXo0qjGAVJipJp7kW4ZhqeI-2BVzlDiSvUdBhNiDSOkkEGz-2F-2BsjAlIub58dVR0NI9bc3HkZw7EcYk-2F3xGjFXEn0meCGguI-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff33569758,0x7fff33569768,0x7fff335697782⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:22⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=748 --field-trial-handle=1860,i,15664040524970372334,12238924456829178293,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b07e621e4fc9b4498c75d30e77a1b712
SHA1359bf65dc36d3b948be768839a44fbf56e93631e
SHA2562664de034d02e3058ddc73c1340d68e1ee3742a892db61766843563db1ae1457
SHA51296836d2a5e6d6972dd119b286581c0c86ae2a40bfa0b4f2a267053eb960c0608aeddbc8bebae9a9b69c858afb464067c563374d02a70bf9647b88c2c037176c4
-
Filesize
6KB
MD5acd4d4d985f093e63272fd6bd3786cb8
SHA1a2b5f581ab3420f94fde34a71582d9ff7840ec6d
SHA256bdc23bf0db1dc62858e10051b6137b3b85c1d3fefa515f8d17af8107fe75a864
SHA512e0cd0a5ef4413555877b17a092831a4cfbc0791145491c4b597d9b56a6d2e12658bb6d4b1f2e5f87a59f586649b6a4ed38c7477c5122b02fc07c11f4cd2be356
-
Filesize
109KB
MD52663fe991f6ab3cb0d4415e27e032550
SHA103e8e54a56a1ae8f2ac8b0b2ee921640342a5a4a
SHA25679770f3ed6094a99e54338d574e048656b0e86f17d86c6c946d5ee8c3e0d1782
SHA5127a45805a2f2e59fc748d5c6370177d347eec90511c792c5791bbd0665800dd2b8c645bec06ed7aac482cbde26239b55a7faaa814fa711880d2d83ce7a3cd938f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd