Analysis
-
max time kernel
412s -
max time network
417s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 06:09
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.1800petmeds.com/track?t=c&mid=26061&[email protected]&extra=2&&&https://h6l834.codesandbox.io?0i=cGhpc2gudGVzdEBleGFtcGxlLmNvbQ==
Resource
win10v2004-20231023-en
General
-
Target
https://t.1800petmeds.com/track?t=c&mid=26061&[email protected]&extra=2&&&https://h6l834.codesandbox.io?0i=cGhpc2gudGVzdEBleGFtcGxlLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444157643435156" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3792 chrome.exe 3792 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe Token: SeShutdownPrivilege 3792 chrome.exe Token: SeCreatePagefilePrivilege 3792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe 3792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3300 3792 chrome.exe 85 PID 3792 wrote to memory of 3300 3792 chrome.exe 85 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 1748 3792 chrome.exe 88 PID 3792 wrote to memory of 2688 3792 chrome.exe 89 PID 3792 wrote to memory of 2688 3792 chrome.exe 89 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90 PID 3792 wrote to memory of 3776 3792 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.1800petmeds.com/track?t=c&mid=26061&[email protected]&extra=2&&&https://h6l834.codesandbox.io?0i=cGhpc2gudGVzdEBleGFtcGxlLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2e419758,0x7ffe2e419768,0x7ffe2e4197782⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:22⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3388 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1884,i,4468491389479161593,564430696871024556,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD51ee389e1522135ba584877108f3def7f
SHA1dd5a29fb5f4919f6e7b70881d76f0fb9ee400201
SHA2569b031a9bfd65cbe21412c16a24a650031efa6bffd5d4c929611e529fd96bfd69
SHA5122bc27ea59ea3a8c10a01d0c831ba5a12fdcfd282f2f0f98d66c8dd3903f1fda86956e525f652d9958c3b183a2376ec777d33a5a8bafe64691bc4050dea3678dc
-
Filesize
2KB
MD50cd7c16eafd664e0442c533d14ff0684
SHA173be4873906b0f8619f8dba7da571e120fc22e4e
SHA256c7370d1345c2bc4e560e50c32fea4b58f4b666b2568878c229a8ed33238bc5b2
SHA512e604fac5022eb09af95c7a7a601d3740c664e7f08de01d042ec58ae806b42571ca024d2a2d45d06ba7160f67fb006e4814a1f2d3fb4f329395ad2cbbbccacdbc
-
Filesize
2KB
MD5103c411e7213f6c347cf733d5b57b7c7
SHA11c508223bf4fd0ddb2008933546dc29bfefd847f
SHA256792b296aefde217993c21b7972976e055dcccb4192a43b9e8e22581ebfdb87e2
SHA51293c66ad08f3ceb839a3c041fd4688c19d7203d3fa42acb25fa953b97180747a82db25b7986a7b08bf414f3175a397182e9fa570089e5a90078b6919c365c109c
-
Filesize
6KB
MD5acd90b519c054bda122c8e4842df8edc
SHA1137d13901dce016a7e69e96edefc6e31d1734759
SHA2562240107389efca4b971e29bac27b3b8ca8f15f154c6496b83804c930a5dc379a
SHA512b71c759a69add2a94da7742b11fadc722b3661eb126ff506651040192170282d48d770d7c4db840faf5a85d940071907c73aba98f4beaea70b9d8e64a49bdb8e
-
Filesize
109KB
MD51fcea101c336eb1ef8014fe92f3df9be
SHA1c9797bf611eab497dac677cb3aef315613072d8c
SHA25678db855906c08ef283bae5dbd1a95e2d747ba3ff749e9f7123d8bd0a1bfb835b
SHA512d576634283f9d131911dbb6aef429d6177311db6a7b4c526cb0aa27c7ca660001196f6926b19c4984ba4b3be6833b6bf01a49ed946679b4a8d055c3ca08480b5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd