Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 04:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/open.php?u=31345974&id=a20cb4bc673d4e75a1778b5b51aba224
Resource
win10v2004-20231020-en
General
-
Target
https://mandrillapp.com/track/open.php?u=31345974&id=a20cb4bc673d4e75a1778b5b51aba224
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437196841177423" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 672 1760 chrome.exe 16 PID 1760 wrote to memory of 672 1760 chrome.exe 16 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4196 1760 chrome.exe 67 PID 1760 wrote to memory of 4340 1760 chrome.exe 66 PID 1760 wrote to memory of 4340 1760 chrome.exe 66 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63 PID 1760 wrote to memory of 4220 1760 chrome.exe 63
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa50149758,0x7ffa50149768,0x7ffa501497781⤵PID:672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mandrillapp.com/track/open.php?u=31345974&id=a20cb4bc673d4e75a1778b5b51aba2241⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:22⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1880,i,16840810178854479860,2188920276680600297,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3404
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5516
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:5552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f51e097299929b6c09a51a3c8efaf294
SHA1b24fcd3a7a0a25fa9ed9c82c39ccb5ebb4ba9324
SHA25610e6c4789922a46279265b903f2812414d63b82d217fd29a4c5e5e88cd4e26d8
SHA51291bc8b293c7e09d0963c847f1d20205cdbe259bf1cd6ffe0910418d27322ca56b21f8ce782685501f695727f285bc457341c3813eff0062c658e5fbf11e3fced
-
Filesize
6KB
MD500b52a3d76a90bf57772330ebd4334a0
SHA1f1593063e724ab78b2d47db6d5ee9516030689b3
SHA25688f68a7f40cb540598b2e904465fd0f1d1c71eff271bb7a27a21951fadbd4d03
SHA512dffe17e3c3366ddfae18e26d4caa1bab6e78c744f4a79aa75dff04a7c4e338514af9ffb353c0164b33dce190135ae2aca21a16e7659ed38004de6c7728e2eeb9
-
Filesize
109KB
MD5d2b37823ec56b8ef3d926e3297160e73
SHA1321681142bf8f737391bebcaf0c6fa8339426505
SHA256afe98b2f0eb7e7022a9ba26fe423d99c3c6f6d306d6231c7ec81b22846dad1b7
SHA512574032fef918ab067183cba6a6b5456d6a19386ce3fec0044bab573ba346e785b3738219f3fe365cd63dec31659f725a73e42c8b4515db150143939833b02f5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd