Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 20:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mcughnsalomudia3.kartra.com
Resource
win10v2004-20231020-en
General
-
Target
http://mcughnsalomudia3.kartra.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450728273100009" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3480 4052 chrome.exe 33 PID 4052 wrote to memory of 3480 4052 chrome.exe 33 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 1496 4052 chrome.exe 88 PID 4052 wrote to memory of 860 4052 chrome.exe 89 PID 4052 wrote to memory of 860 4052 chrome.exe 89 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90 PID 4052 wrote to memory of 2604 4052 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mcughnsalomudia3.kartra.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff847db9758,0x7ff847db9768,0x7ff847db97782⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3864 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3288 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,15636172946583056088,13920338597994889110,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
288B
MD595d8762c872795222963a9e9d33b16bc
SHA161397d1a28dd3f9e940074c7c2df491122ec7f1e
SHA256c760aadd9248deaa601c82d0dcfd909ff4ca5722dfad6237ca7643bdc08a2d24
SHA512537f08b0030cdb14c4cf9d024ceb3cd7e9d1051b7e5f3a94fc9e6687a1d9c746db5e983ea03401bad8491f8a563f39c0f992d3bb49abab445bc73f5b077a3515
-
Filesize
873B
MD584493124d63a6c935825ecebb7d9bd42
SHA101e15267875acc3da9d381f8984afbbf214b60ab
SHA25656ac21ad15b01215df8c0da334d9aee0a5b422536424496b1d7823dca3c5d7f8
SHA512ead1657640dcfabd4a2ee72d018b67e563366fcb672bb89fadc19df57bfc5d42de3f77894a0158d054d6c6df74a5cb20b2794805e11d05937763a91a8414fd3b
-
Filesize
6KB
MD52b61ff682f6c407583eb473ae8eb72de
SHA19c81a95fa7874fadd8fe5b71c2ec69747de0ec70
SHA256743be71a85af3a0e0fed1e9ac61f1e126fd965b68edf913a2f4deac7a960b38e
SHA5124bdd239c868867610f2863602a9f4eb1e4dad0f0dfa537b471302f6a73762d0441d6c7948e46780f494856082f2b559e51fc8f64770324b3be4565c943233c65
-
Filesize
6KB
MD5e93244d38e848615553a7a9bd5e70530
SHA1e6bb7aec1b4c67e2fd48b6e1fef172e59b03e083
SHA25660427972f9e2c85581ecc8eda0474df4601c40eeca0995e28a38232bdf05f62a
SHA512adc29f6a06a86f99c2a551876492297502054b6c98f1a48104e10359675effc016f851550c02790a25bef2e41a6b2fa3709e0f248884fbdf5333685cd8d99f27
-
Filesize
109KB
MD580b7a67251b3604d18e967c8a7766448
SHA10e2255ea5669c3d9eaa8d880301eb49b700fd50d
SHA2567050ba1ac5f2c16f42ad1c2b3e279fc8a20c73c0e8b4a1c8b101b72da6059b2e
SHA5129c4bc9ba3dff479fe3503c6d1ca384b7fb0ec37c377232129cb52d03b5e82ff5d805b53e786d6cc9c42b6436a6cdb62989fa731fb2d7d6378249845164684e7b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd