Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2023 17:55

General

  • Target

    https://hs-1334637.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnfP4_6QDmHdW49hBTP3zb1gKW4tt7693zd-fZW4cg7sG3_qTg9MWSS4m69Sn6VQtzgB8WGwwgN70MDNrDbP0_W6dGhpz9lkS20W5WZn6g6_dP01V1yf0N30YYXrW5Q5NP127Ynv0W3NP6gG5w4rXP22T3&v=3&utm_source=hs_email&utm_medium=email&utm_content=283585087&_hsenc=p2ANqtz-9W62g8dK3IIglZ0SaS1Li_oDHNv3d7L1y_PBRBU0v5hTSrElp7PYq7ObfUPLs4zB15fDyOYRt0nYVFKmgRi06vUS6N4w&_hsmi=283585087

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hs-1334637.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnfP4_6QDmHdW49hBTP3zb1gKW4tt7693zd-fZW4cg7sG3_qTg9MWSS4m69Sn6VQtzgB8WGwwgN70MDNrDbP0_W6dGhpz9lkS20W5WZn6g6_dP01V1yf0N30YYXrW5Q5NP127Ynv0W3NP6gG5w4rXP22T3&v=3&utm_source=hs_email&utm_medium=email&utm_content=283585087&_hsenc=p2ANqtz-9W62g8dK3IIglZ0SaS1Li_oDHNv3d7L1y_PBRBU0v5hTSrElp7PYq7ObfUPLs4zB15fDyOYRt0nYVFKmgRi06vUS6N4w&_hsmi=283585087
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x88,0x108,0x7ff9069d9758,0x7ff9069d9768,0x7ff9069d9778
      2⤵
        PID:1036
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:8
        2⤵
          PID:1816
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:2
          2⤵
            PID:436
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:8
            2⤵
              PID:3056
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:1
              2⤵
                PID:4560
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:1
                2⤵
                  PID:3656
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:8
                  2⤵
                    PID:4472
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:8
                    2⤵
                      PID:3208
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4564 --field-trial-handle=1900,i,9134023830870298035,14786335733686424823,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1396
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:2344

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                      Filesize

                      192B

                      MD5

                      06bfc1721fce3a6605554aee251c49a5

                      SHA1

                      9d90c0e1204fbe7f3caf733d5082c7277ef94972

                      SHA256

                      61998f778090c91d46655b11bb5ddfc930e7087d30adb808c4ddfb26241e87ea

                      SHA512

                      1f3d582f607564f502965ca58167d6a8db38331db591277b419ac34d2d7a4abe53efcf521160878e9e7b20cf6c660d909a75069a9613c1ed6a8265328971b965

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      1KB

                      MD5

                      428e5a81c069c201b250aa691a426bcc

                      SHA1

                      7c981bb302fbbc87efd1c21511e154cd54c86933

                      SHA256

                      674083e886990f7c6c0d15f7ba91a94c2129aaa39080ac327e3be6401b12231a

                      SHA512

                      831ae4201dd3faae78dcecfa887a8fe2e7eb10c60ab93c5626b91c0871687d0f9cfb92b6fa71bf929a51d5a24beda52baa4faa7970d25842928a08179a073ae2

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                      Filesize

                      705B

                      MD5

                      68c7b025e823129a273c5d896d46e573

                      SHA1

                      aa73df0468b02d145d78173abddb84cdbb132373

                      SHA256

                      6d2217bc39a397dfaf214ed7688c5513a3457282732f6c479dc95a2950c8f294

                      SHA512

                      4fdd2d399e49b78fb3429fe2ab5ba70abb0e76405949b01b61468b61c2d7f13130caa5f06bf397e45267e0d64e61d58dca45958a4bc6b67fbc96aacbd26eddbc

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                      Filesize

                      705B

                      MD5

                      7b6dd805e9cdb4ee4603c2b58061e37b

                      SHA1

                      22ca0bd56efcdb7ab875a63b96e37d03026fcc9a

                      SHA256

                      b0d2e49a348396ba99f48573869f7400320e95d3ce94e9319611cd6358568d64

                      SHA512

                      7875539ae27771545683a5fbee3ab33226a318748db3a78648b1209d59ea69648e2aa4fdececbc100f95ed15306ccc33b686fd18658c67376d3bd3fdb8fcf84e

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      3cc744b8beb6c29f0a6e8b470c3873a1

                      SHA1

                      5de73f546dc5bd5d85e88ffddca19f7def70302b

                      SHA256

                      26592b0b892ba05d8c95fc6dbf739ec4df38414c0b4de506955c868ca6ca0d0b

                      SHA512

                      48263e5a41d5b90c250e70b8a1c97a6c3760ebe451c85323f366604d94d54e799ab888ef5b50767734b84a394db88b0028640af8d269d1ced836690aa47d6024

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      c639eb66a998571f09276bad17cfcfef

                      SHA1

                      330ee2464e5ecebf111d8aa6f0d66c0fabf97d9c

                      SHA256

                      d75971d8c32589b05be7e9c1c446f4a84df238e90630e8c062f9dc223c9d3460

                      SHA512

                      5501cf65c82515bcf454e981cae578371c381f6187edd9da8cb8934157a147fb137c15410fa43b4e18023e967415ec5da3e6e93698608f59689d6c67a29cab11

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      0cfeffb826243c0bca93a0cdffd26590

                      SHA1

                      e68a9c2426a08bf85232cfbf1b1766202d91d0bc

                      SHA256

                      1077990711043491055415285c5b997b071a13930075bf7d9ff8f65aeb7a032d

                      SHA512

                      1af460212a669bc9171df831e53d5c2c9d143ef8085feffea99c468891d472448be954e7d4d9bcfaa9740c42f35df62d2aa49ff87e49151c5d762cdb13d43a74

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      5f5288f8cd4414fe0e1245145cfa9286

                      SHA1

                      6368978eccbde21f688375aa6e6e94f503658f0d

                      SHA256

                      a52fa843e73be07178e07122af9ee77e44dd24175e45277ff3db710b77f30797

                      SHA512

                      da29414136a43c700b9706b34d0ef9e5e435c35d7e08bbd9eab01b9657ac965d9ca24a15a8377eb0df3c09eaf223780b2ce678c0975d9f5276a0395dc3a6e735

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      109KB

                      MD5

                      9a716c01c842fa50b2df4f615d6fbc44

                      SHA1

                      58b9dce3e596a7021fe35c272f15e4bc122e4335

                      SHA256

                      e5ae8d2277595205283f4affadd33f18d592867f74f7fa6cb9a3c2b5d44832e1

                      SHA512

                      e28210da686a44ac33164f71bf28d4541dc7e9f255d33a15f3a6e8df993e9b2e35bfc22e4fa8061c981f98a05e7bead07f5e4d1e170ebf30ac38e46e05f6063f

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd