Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2023 07:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ct.klclick.com/f/a/FFbbnUQpEgEx_sw8N-oSpQ~~/AASl5QA~/RgRnZ5N6P0SyaHR0cHM6Ly9tYW5hZ2Uua21haWwtbGlzdHMuY29tL3N1YnNjcmlwdGlvbnMvdW5zdWJzY3JpYmU_YT1WN2ZocnImYz0wMUhKN1RaREI4VlBUM1EwTTgxSDEzQkNSNSZrPWNkYTZhMzFjZjE3MGEwOTY0Njg2NGNhMzcxNWFkNGEzJmc9VDRaY3ZOJm09MDFISjdTREhDNU1LWFREN0RCQzRZR1g3RDImcj0zZmloTFpuUFcDc3BjQgplg3oOhWW3tNDbUhlwZXRlci5qZWZmcmV5QGpldHN0YXIuY29tWAQAAPoj
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://ct.klclick.com/f/a/FFbbnUQpEgEx_sw8N-oSpQ~~/AASl5QA~/RgRnZ5N6P0SyaHR0cHM6Ly9tYW5hZ2Uua21haWwtbGlzdHMuY29tL3N1YnNjcmlwdGlvbnMvdW5zdWJzY3JpYmU_YT1WN2ZocnImYz0wMUhKN1RaREI4VlBUM1EwTTgxSDEzQkNSNSZrPWNkYTZhMzFjZjE3MGEwOTY0Njg2NGNhMzcxNWFkNGEzJmc9VDRaY3ZOJm09MDFISjdTREhDNU1LWFREN0RCQzRZR1g3RDImcj0zZmloTFpuUFcDc3BjQgplg3oOhWW3tNDbUhlwZXRlci5qZWZmcmV5QGpldHN0YXIuY29tWAQAAPoj
Resource
win10v2004-20231222-en
General
-
Target
https://ct.klclick.com/f/a/FFbbnUQpEgEx_sw8N-oSpQ~~/AASl5QA~/RgRnZ5N6P0SyaHR0cHM6Ly9tYW5hZ2Uua21haWwtbGlzdHMuY29tL3N1YnNjcmlwdGlvbnMvdW5zdWJzY3JpYmU_YT1WN2ZocnImYz0wMUhKN1RaREI4VlBUM1EwTTgxSDEzQkNSNSZrPWNkYTZhMzFjZjE3MGEwOTY0Njg2NGNhMzcxNWFkNGEzJmc9VDRaY3ZOJm09MDFISjdTREhDNU1LWFREN0RCQzRZR1g3RDImcj0zZmloTFpuUFcDc3BjQgplg3oOhWW3tNDbUhlwZXRlci5qZWZmcmV5QGpldHN0YXIuY29tWAQAAPoj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 364 chrome.exe 364 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 364 chrome.exe 364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe Token: SeShutdownPrivilege 364 chrome.exe Token: SeCreatePagefilePrivilege 364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe 364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 4160 364 chrome.exe 19 PID 364 wrote to memory of 4160 364 chrome.exe 19 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 4684 364 chrome.exe 92 PID 364 wrote to memory of 2372 364 chrome.exe 91 PID 364 wrote to memory of 2372 364 chrome.exe 91 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90 PID 364 wrote to memory of 1920 364 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ct.klclick.com/f/a/FFbbnUQpEgEx_sw8N-oSpQ~~/AASl5QA~/RgRnZ5N6P0SyaHR0cHM6Ly9tYW5hZ2Uua21haWwtbGlzdHMuY29tL3N1YnNjcmlwdGlvbnMvdW5zdWJzY3JpYmU_YT1WN2ZocnImYz0wMUhKN1RaREI4VlBUM1EwTTgxSDEzQkNSNSZrPWNkYTZhMzFjZjE3MGEwOTY0Njg2NGNhMzcxNWFkNGEzJmc9VDRaY3ZOJm09MDFISjdTREhDNU1LWFREN0RCQzRZR1g3RDImcj0zZmloTFpuUFcDc3BjQgplg3oOhWW3tNDbUhlwZXRlci5qZWZmcmV5QGpldHN0YXIuY29tWAQAAPoj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf4e79758,0x7ffaf4e79768,0x7ffaf4e797782⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:22⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 --field-trial-handle=1908,i,10633784182831000733,14123885719888199312,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c52fff3e1bb3c89384fdb1d536329e8
SHA1f4e978e706111f7ddf67aaa9870804e753d728ee
SHA25658b29365e2df6fc15c0d7ca61a7053447c450c6daa1f50ef201d903cf01ecc68
SHA512e39b06c69c4f61f31446a7b502e05c3475b3d68d88d6042d36d3e79cc0c2e63bed7606eeae07afa22f6b36fd678b0ee3cc5af8bc71b3f4dcdc3ca92bf18d2913
-
Filesize
6KB
MD5ea73195103d79ecac6863c7a86bf3804
SHA18386c835246112be3932244a52f96e3e6b20a34d
SHA25683823a7711e3c531f6cf9aa0cf308140043b69d84ccab065937c49459c680af3
SHA512c708bafe0529db8cb575dcf47318635582cee8c36d63673339cfd32053b23a687155b81f2be7551a27b71500804e161f3c1a640b25398bf1f1f4a48d5253d154
-
Filesize
114KB
MD593b72a4a9ed13bdfbfa808dc646f2255
SHA10a8da3d8e89fcc1b5eb0f5c993577d2bc423658e
SHA256eda10c553f08e165595b28a305dfb5465a5f509b98e31ad38b15a6302de6e979
SHA5124f710c84f3f30cb04949d740fdd8cb16e308dff2a0e1fc4d46de49e21d3c898c469fb0b43bb8a17a416ea16ab66f2507bc69c076ff9ccedffcb1632d709e343d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd