Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 17:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hs-1334637.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnfP4_6QDmHdW49hBTP3zb1gKW4tt7693zd-fZW4cg7sG3_qTg9MWSS4m69Sn6VQtzgB8WGwwgN70MDNrDbP0_W6dGhpz9lkS20W5WZn6g6_dP01V1yf0N30YYXrW5Q5NP127Ynv0W3NP6gG5w4rXP22T3&v=3&utm_source=hs_email&utm_medium=email&utm_content=283585087&_hsenc=p2ANqtz-9W62g8dK3IIglZ0SaS1Li_oDHNv3d7L1y_PBRBU0v5hTSrElp7PYq7ObfUPLs4zB15fDyOYRt0nYVFKmgRi06vUS6N4w&_hsmi=283585087
Resource
win10v2004-20231023-en
General
-
Target
https://hs-1334637.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnfP4_6QDmHdW49hBTP3zb1gKW4tt7693zd-fZW4cg7sG3_qTg9MWSS4m69Sn6VQtzgB8WGwwgN70MDNrDbP0_W6dGhpz9lkS20W5WZn6g6_dP01V1yf0N30YYXrW5Q5NP127Ynv0W3NP6gG5w4rXP22T3&v=3&utm_source=hs_email&utm_medium=email&utm_content=283585087&_hsenc=p2ANqtz-9W62g8dK3IIglZ0SaS1Li_oDHNv3d7L1y_PBRBU0v5hTSrElp7PYq7ObfUPLs4zB15fDyOYRt0nYVFKmgRi06vUS6N4w&_hsmi=283585087
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133454949925117313" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 840 chrome.exe 840 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 1036 840 chrome.exe 62 PID 840 wrote to memory of 1036 840 chrome.exe 62 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 436 840 chrome.exe 87 PID 840 wrote to memory of 1816 840 chrome.exe 86 PID 840 wrote to memory of 1816 840 chrome.exe 86 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88 PID 840 wrote to memory of 3056 840 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hs-1334637.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnfP4_6QDmHdW49hBTP3zb1gKW4tt7693zd-fZW4cg7sG3_qTg9MWSS4m69Sn6VQtzgB8WGwwgN70MDNrDbP0_W6dGhpz9lkS20W5WZn6g6_dP01V1yf0N30YYXrW5Q5NP127Ynv0W3NP6gG5w4rXP22T3&v=3&utm_source=hs_email&utm_medium=email&utm_content=283585087&_hsenc=p2ANqtz-9W62g8dK3IIglZ0SaS1Li_oDHNv3d7L1y_PBRBU0v5hTSrElp7PYq7ObfUPLs4zB15fDyOYRt0nYVFKmgRi06vUS6N4w&_hsmi=2835850871⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x88,0x108,0x7ff9069d9758,0x7ff9069d9768,0x7ff9069d97782⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:22⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4564 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD506bfc1721fce3a6605554aee251c49a5
SHA19d90c0e1204fbe7f3caf733d5082c7277ef94972
SHA25661998f778090c91d46655b11bb5ddfc930e7087d30adb808c4ddfb26241e87ea
SHA5121f3d582f607564f502965ca58167d6a8db38331db591277b419ac34d2d7a4abe53efcf521160878e9e7b20cf6c660d909a75069a9613c1ed6a8265328971b965
-
Filesize
1KB
MD5428e5a81c069c201b250aa691a426bcc
SHA17c981bb302fbbc87efd1c21511e154cd54c86933
SHA256674083e886990f7c6c0d15f7ba91a94c2129aaa39080ac327e3be6401b12231a
SHA512831ae4201dd3faae78dcecfa887a8fe2e7eb10c60ab93c5626b91c0871687d0f9cfb92b6fa71bf929a51d5a24beda52baa4faa7970d25842928a08179a073ae2
-
Filesize
705B
MD568c7b025e823129a273c5d896d46e573
SHA1aa73df0468b02d145d78173abddb84cdbb132373
SHA2566d2217bc39a397dfaf214ed7688c5513a3457282732f6c479dc95a2950c8f294
SHA5124fdd2d399e49b78fb3429fe2ab5ba70abb0e76405949b01b61468b61c2d7f13130caa5f06bf397e45267e0d64e61d58dca45958a4bc6b67fbc96aacbd26eddbc
-
Filesize
705B
MD57b6dd805e9cdb4ee4603c2b58061e37b
SHA122ca0bd56efcdb7ab875a63b96e37d03026fcc9a
SHA256b0d2e49a348396ba99f48573869f7400320e95d3ce94e9319611cd6358568d64
SHA5127875539ae27771545683a5fbee3ab33226a318748db3a78648b1209d59ea69648e2aa4fdececbc100f95ed15306ccc33b686fd18658c67376d3bd3fdb8fcf84e
-
Filesize
6KB
MD53cc744b8beb6c29f0a6e8b470c3873a1
SHA15de73f546dc5bd5d85e88ffddca19f7def70302b
SHA25626592b0b892ba05d8c95fc6dbf739ec4df38414c0b4de506955c868ca6ca0d0b
SHA51248263e5a41d5b90c250e70b8a1c97a6c3760ebe451c85323f366604d94d54e799ab888ef5b50767734b84a394db88b0028640af8d269d1ced836690aa47d6024
-
Filesize
6KB
MD5c639eb66a998571f09276bad17cfcfef
SHA1330ee2464e5ecebf111d8aa6f0d66c0fabf97d9c
SHA256d75971d8c32589b05be7e9c1c446f4a84df238e90630e8c062f9dc223c9d3460
SHA5125501cf65c82515bcf454e981cae578371c381f6187edd9da8cb8934157a147fb137c15410fa43b4e18023e967415ec5da3e6e93698608f59689d6c67a29cab11
-
Filesize
6KB
MD50cfeffb826243c0bca93a0cdffd26590
SHA1e68a9c2426a08bf85232cfbf1b1766202d91d0bc
SHA2561077990711043491055415285c5b997b071a13930075bf7d9ff8f65aeb7a032d
SHA5121af460212a669bc9171df831e53d5c2c9d143ef8085feffea99c468891d472448be954e7d4d9bcfaa9740c42f35df62d2aa49ff87e49151c5d762cdb13d43a74
-
Filesize
6KB
MD55f5288f8cd4414fe0e1245145cfa9286
SHA16368978eccbde21f688375aa6e6e94f503658f0d
SHA256a52fa843e73be07178e07122af9ee77e44dd24175e45277ff3db710b77f30797
SHA512da29414136a43c700b9706b34d0ef9e5e435c35d7e08bbd9eab01b9657ac965d9ca24a15a8377eb0df3c09eaf223780b2ce678c0975d9f5276a0395dc3a6e735
-
Filesize
109KB
MD59a716c01c842fa50b2df4f615d6fbc44
SHA158b9dce3e596a7021fe35c272f15e4bc122e4335
SHA256e5ae8d2277595205283f4affadd33f18d592867f74f7fa6cb9a3c2b5d44832e1
SHA512e28210da686a44ac33164f71bf28d4541dc7e9f255d33a15f3a6e8df993e9b2e35bfc22e4fa8061c981f98a05e7bead07f5e4d1e170ebf30ac38e46e05f6063f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd