Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 15:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.simplysendin.com/index.php/campaigns/qx162tgql91f0/track-url/hf660x84d0c68/642e6e422abbf216e4bac5f6ca1b895015f299fe
Resource
win10v2004-20231023-en
General
-
Target
https://app.simplysendin.com/index.php/campaigns/qx162tgql91f0/track-url/hf660x84d0c68/642e6e422abbf216e4bac5f6ca1b895015f299fe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133451400136783641" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3056 2636 chrome.exe 85 PID 2636 wrote to memory of 3056 2636 chrome.exe 85 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 408 2636 chrome.exe 89 PID 2636 wrote to memory of 3872 2636 chrome.exe 90 PID 2636 wrote to memory of 3872 2636 chrome.exe 90 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91 PID 2636 wrote to memory of 4204 2636 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.simplysendin.com/index.php/campaigns/qx162tgql91f0/track-url/hf660x84d0c68/642e6e422abbf216e4bac5f6ca1b895015f299fe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8f31c9758,0x7ff8f31c9768,0x7ff8f31c97782⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:22⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1888,i,842240782515438585,5673286497867587803,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55c84da66c1945d0f199ea4828bf8752d
SHA155b4b7bc84e224950f5f244cc92cd30957c49fb3
SHA256136096187657c1e39a7667e535559cd217874e90ca9bfb8b63dff05e89ccdf56
SHA512644d0aa1f971ceac17c80ef6d0c34893e6e596f1e9feb97b43e7a92503d8fd8b75ee22163eb16d11b5e8adb17b093911269cb40aed0cb03565f1eb8f77fe1c63
-
Filesize
109KB
MD564bb63536ba70b474db1fd6aab23bd27
SHA1fae061f475c4bf5e0c3a968a881d835c21a1165c
SHA256aad77955d9bd8d1497775e8ada884dce80504e136ce73db5a9ad145476ee5510
SHA51245ef01cb558460b982ca6bf04d38ee9d7a1a6142315e3ce9033632c894d9a0e7260d705f2c48f563e246c4491175d8e4fea6d9d13b46c5651f3b276f628242af
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd