Analysis
-
max time kernel
114s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 15:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d2vYxD04.na1.hubspotlinks.com
Resource
win10v2004-20231025-en
General
-
Target
https://d2vYxD04.na1.hubspotlinks.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455714800267914" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2936 3796 chrome.exe 45 PID 3796 wrote to memory of 2936 3796 chrome.exe 45 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4184 3796 chrome.exe 88 PID 3796 wrote to memory of 4660 3796 chrome.exe 87 PID 3796 wrote to memory of 4660 3796 chrome.exe 87 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86 PID 3796 wrote to memory of 3784 3796 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d2vYxD04.na1.hubspotlinks.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb328d9758,0x7ffb328d9768,0x7ffb328d97782⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:22⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4524 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3136 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1864,i,643381906917097316,635496305683960898,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
672B
MD50bce009b766e9a771692d35e047809f8
SHA191a3a5901e13eedece3711c403b2407c39c35390
SHA256dabb0e11a39578fbf525300c163bd1f3cf79bafe89ed417260e5014530d9dab3
SHA512e5068df900eb5dc66df5287fa877b9b74a3c1022e22c069ae63f3db478bc72dfb411ea273e6f437dee3d7b52e706e56e6e11cc2583ba1062c3b0228437543df1
-
Filesize
3KB
MD500a79081b3be301c86da4566a8aa7e30
SHA1d5cca3c416b67eae39ec5efb4b527648ba88e717
SHA2568deefc9dd9f6b1d3d09f52857a90d1b57945a84eecf75f87ad6c52b626ac6f68
SHA512acb1e443f8bbbb6d74c9c853d584b843ea50443a4fbf244f610d8edcdd487861d08d492d6b5cd9db5d04a2d59dbc4189d3c6b4d6051a9471f8e0e0392ee36c8a
-
Filesize
2KB
MD5b8100744bf17e2ed8177ab9804331211
SHA1b8e2974042590f18bde564bbe19cbb33746b364e
SHA256755bb8ec100bdeae261017fef269712ce02acda1c5f98a8b6b1ab153112466e1
SHA512bf113c88f60911e8cbbae697e9aecab222ca6ff9ba279d5a78d6f39bfffbd4ac5107c036721799b2cf425a595b56d631d7a9ddd9f22e58c6b5bf895d2fb0b29b
-
Filesize
2KB
MD59ecf014a9ad36663ccc7c53674767e93
SHA110c2e7f14609f5cbd10b764d3808c0deedf0487e
SHA2564c3d0d865529857c9b599c65bfa358eebdc61ad5803160ee1b142e4851377bbd
SHA512f183f74149c232849ab2e32b275a0a056f9a2d1a943abeed5727db3b3a3c53bfad619af482efc24eecf01c24336fdb8ce2b0a0d0642722c781bf273e134a007b
-
Filesize
2KB
MD5ce740c61ab60d72f3883c48bb0cf8d2f
SHA1b2118ccc24c7cca86045ca01deb237aba0425a08
SHA25685c4e7136c567dfcb44af3ffdeb1d800da324ffc6b99ce4d412182e4d2a0863a
SHA5122e4203c62dee3260652e7d283dc69f3ec9a374b7ce241eff991e511a5fcae8461d308cfb7131679d71c981fb75d8fa42446b0bb85deb0e449beb309ae8be1226
-
Filesize
6KB
MD5f0f13929bf76627da205d71588b8eced
SHA13bfff48e4573d291cbd9ab88c009a174aeb54bb0
SHA2566129276aa9612d8436f4237e8659066d9646d3b2c25a4c698487837e3ff8cfb0
SHA5126c968a61fc3661d1aeba8717311f25baab2a3f53458ca217f40096ad1f634dd8972ca6386819f5476756a8ee080063b9a13f550c1c4163517bd442ede26ea4d0
-
Filesize
109KB
MD5e443fc2bbfdbf72fb01e924b46ef3171
SHA1ed2292a7c870f0dc45a1b400cbb7b0c7351b9ec9
SHA25657d69ce4338c44aa2718c4af552d67232be6905cf73824b29210fa8eb5d6bcd3
SHA512bc0e450b05b907d2a6f98f254ca3d7b294acb09c3ccc09ff5cdc537f594dac31c88619e73def28a615859b7fa33a1b8130db9a609eb131aa891e9998e79bbaf3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd