Analysis
-
max time kernel
41s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 15:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://td.tryoffer.net/f/a/7N62W2UgDFCIoivtEa890Q~~/AAAq-QA~/RgRnMRDPP0UDQ1RBRIVodHRwczovL2Nkbi50cnlvZmZlci5uZXQvcmRyL1lXRTlNVFEwTVRJMU1USTBOaVp6WldrOU1qSXdPVFU0TkRJbWRHczlOMHMyWlZOcFdGZHRjVWwzUVZSS1FWaEZhRm9tZEQweUptTTlPVEJoY3pnM05tWmtPRGxoY3pWbVp6aGhNRGx6VwVzcGNldUIKZUHPi05ltpaEVFIlZGVubmlzLm9vcnRodWlqc2VuQHZpcnR1YWxzY2llbmNlcy5ubFgEAAAAAA~~
Resource
win10v2004-20231020-en
General
-
Target
https://td.tryoffer.net/f/a/7N62W2UgDFCIoivtEa890Q~~/AAAq-QA~/RgRnMRDPP0UDQ1RBRIVodHRwczovL2Nkbi50cnlvZmZlci5uZXQvcmRyL1lXRTlNVFEwTVRJMU1USTBOaVp6WldrOU1qSXdPVFU0TkRJbWRHczlOMHMyWlZOcFdGZHRjVWwzUVZSS1FWaEZhRm9tZEQweUptTTlPVEJoY3pnM05tWmtPRGxoY3pWbVp6aGhNRGx6VwVzcGNldUIKZUHPi05ltpaEVFIlZGVubmlzLm9vcnRodWlqc2VuQHZpcnR1YWxzY2llbmNlcy5ubFgEAAAAAA~~
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453124920686092" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 428 chrome.exe 428 chrome.exe 428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe Token: SeShutdownPrivilege 428 chrome.exe Token: SeCreatePagefilePrivilege 428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe 428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 428 wrote to memory of 1992 428 chrome.exe 28 PID 428 wrote to memory of 1992 428 chrome.exe 28 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 3152 428 chrome.exe 87 PID 428 wrote to memory of 4612 428 chrome.exe 86 PID 428 wrote to memory of 4612 428 chrome.exe 86 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88 PID 428 wrote to memory of 2244 428 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://td.tryoffer.net/f/a/7N62W2UgDFCIoivtEa890Q~~/AAAq-QA~/RgRnMRDPP0UDQ1RBRIVodHRwczovL2Nkbi50cnlvZmZlci5uZXQvcmRyL1lXRTlNVFEwTVRJMU1USTBOaVp6WldrOU1qSXdPVFU0TkRJbWRHczlOMHMyWlZOcFdGZHRjVWwzUVZSS1FWaEZhRm9tZEQweUptTTlPVEJoY3pnM05tWmtPRGxoY3pWbVp6aGhNRGx6VwVzcGNldUIKZUHPi05ltpaEVFIlZGVubmlzLm9vcnRodWlqc2VuQHZpcnR1YWxzY2llbmNlcy5ubFgEAAAAAA~~1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8e309758,0x7fff8e309768,0x7fff8e3097782⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:22⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3752 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4740 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1952,i,10651029312084778144,4635128161023339703,131072 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD56ae9e1ef6e72643755de919b3753fb45
SHA13ae751f2df11f8339494eef0172de488d520aaf8
SHA2562666e96f34e621914d096607cc5c03390c71dde4588fd88ec8898263343cd824
SHA5122467c05bed33f641234b4d7c54271b5201b08fb4e15acfd8a3b8de439b0a73f96da1ff80651f989a74dbf23ad352e97ad5d8deebffa8bca983f7f527075c301d
-
Filesize
6KB
MD5533247f774bebb830bb20ee208c53b0a
SHA16adcf9ff729c38792f183286f1cb143f584bc7c5
SHA256dbe17712cb12fbbb8ed76b05b1f24f547080be28434c7d5bd780f91d5eb672a2
SHA5124845cf7abfbf749df05d69497ce817f105c316dbb209271225390672c774cd794d35d41fadcdbc1b1bf5aef51b20fb55e27aa5cd986cc96456ac75b256cb2183
-
Filesize
109KB
MD586309ccf3eb25ab7b675b94bae2e93e0
SHA15875fae9b2039d91adfdb3d94a48bc444fa3adea
SHA256f5a03f73c9de8b8b5315ce4d6a1e331018a1700b0ea6d79aff6f3bca7fadbd1a
SHA512992a3a051167f0f34801cbd240e61d8f6a2ee2d9554f1a50d763d2d0eb4dd8b0ac0d7b4f553cbd2127ee9b75cc019afb8a9e0450dda035f65e3caa13ec250959
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd