Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 17:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fitnesspassport.us17.list-manage.com/track/click?u=33d6d53bc630c74fc9c8b01e3&id=fbd4e06197&e=fc6539e1f9
Resource
win10v2004-20231023-en
General
-
Target
https://fitnesspassport.us17.list-manage.com/track/click?u=33d6d53bc630c74fc9c8b01e3&id=fbd4e06197&e=fc6539e1f9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453201031307463" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1656 chrome.exe 1656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4388 1360 chrome.exe 27 PID 1360 wrote to memory of 4388 1360 chrome.exe 27 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 2944 1360 chrome.exe 85 PID 1360 wrote to memory of 4784 1360 chrome.exe 86 PID 1360 wrote to memory of 4784 1360 chrome.exe 86 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87 PID 1360 wrote to memory of 4932 1360 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fitnesspassport.us17.list-manage.com/track/click?u=33d6d53bc630c74fc9c8b01e3&id=fbd4e06197&e=fc6539e1f91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd77539758,0x7ffd77539768,0x7ffd775397782⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:22⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3328 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 --field-trial-handle=1868,i,11305690526736037840,11351658419963966703,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
336B
MD529ef0829e5eec562eee2ff4dcd003f01
SHA1ede11c8ff2045db9066fa634fa81f60815d1184d
SHA256d293f6b80865727ba1c64db4973645c5a75e36882d4ed503b02216a912b3f699
SHA512b99583ceffa13b57d0d5b5a0a0619e240d250b320a692ea0cea0e9adfbc9f7d6e3e1735393314db0f29d292011da8eadb47e2cac04e117bdd1b74499e4c2ceb7
-
Filesize
2KB
MD5a6709d7c3b44601a07e31b51ae84ea7c
SHA1becc8a0d9c252e46afd42836878a50f056d1e96b
SHA25683452707694637ab29f48107f62115449c28d4ddf4ac1ce4929623643b8071f3
SHA51249f38668aaae37d65fd1db9bfc69e2f639136f0598f5307d903e580a3feee3bf736c317866b205e36d551e17e7d9456e9a774e9a258181dda4a51ebbdaeae708
-
Filesize
869B
MD507566322afde448b3033ffbd141c3643
SHA1189ab657ee98b95135df99e29ec047ac1cd3a1b6
SHA256297917b6efcb7c805735a42a397e9d6c0eaadbc961b588949a80126ac60b5ee4
SHA512aed91976b94aafcb421803330fdd5a5a077af8e78fda980d6de0db9f57b70107fe22dfb31f1e9e796e3499b735b0966dcd7dbcd2baf712ae1477a3dd2d4051bc
-
Filesize
6KB
MD542873689979910137d8a15f8e8f138a3
SHA1f790303bfbe70e4a852a8a29dcfd4b97ced57e54
SHA256026135bf14dd9f077da820bb0b23f59a391c6d87a81407a1434cc7b210931069
SHA512f47b5188e6ce3189ea7241baef7cb34748284c100a9468e2fa7250ab6cc2114f257d3d19aec24efd339fb97de81644e78b6ef11e7c6115b2f9cd4182c963e862
-
Filesize
6KB
MD5175ad26ad7808df728c8f7dbc7a5e4b1
SHA17c9745f23526b43d9472c2dcba1615cc5cfd0c07
SHA256005b0999589b183d53ba3b2878af74cb84503341c9cd6e04fa10b8eaab400fdc
SHA512faa3d61dd8901500095099197508cf25243874064a136b646f203d5be2db9922cf8e735af2ad7071c79d9450a6acff2349032f96d0bd7189454273b5e28305d2
-
Filesize
6KB
MD50c4e53ac859b96635bead233cdf4e348
SHA186ba908b52f31e940a53315c4a981a75bc4c1e4f
SHA2568adc831ec0a75333954831360b80126d950f8b2a19b5319e1f0de240d858f847
SHA512afce6a01fb32de0675c687fd7124147322591453aa25030f01d5ef942a6cdb502e6d2ab86baf6f02311975ac4570b04f58a8dddd3442ac3ec243a9afe45a6825
-
Filesize
5KB
MD5f4dbe25af64dd3d0a5455778415c1d01
SHA15d0105dab5063bab31f6b435a5f5428119b43b07
SHA2562621d2a5302bbf736c665d50f983367af3dfdd34ada6b822a82a4b8265d529fb
SHA5127ceec082cf07d489553ad771431aa582c8b281bf92ca795d6c6acbd83e2d0ba50f25037434b1c419d9279d10c6c2815df7f5fff08d31c8fb0c57094b1ae76086
-
Filesize
109KB
MD55fad98e918fa58fcf226e98df5b145fe
SHA152c39ef4d88ee171f1b8836685afff880702ee2e
SHA256389d94f35644223564cef514255e96d0b6f30f51fe6620acb0fdbcbdfaf03ef7
SHA51222e11422d54f4100891466794eaf6b164a13fbbe42fe9e3975308d0f2fccac07b93fca3928d3e1f4902c37a163786afceb3de7da5aa5993367b4cbc2ed73e161
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd