Analysis
-
max time kernel
296s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 23:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.pstmrk.it/3s/www.123cards.com*2Fpick-up-ecard*2F*3Fcode*3D4684550111e*26utm_source*3Dtransactional*26utm_medium*3Demail*26utm_campaign*3Decard-recipient-gf0-pr1/UTCB/0h_yAQ/AQ/8290624f-4149-4be2-9501-9e2395d2f5ed/2/kltmHL4TAy
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://click.pstmrk.it/3s/www.123cards.com*2Fpick-up-ecard*2F*3Fcode*3D4684550111e*26utm_source*3Dtransactional*26utm_medium*3Demail*26utm_campaign*3Decard-recipient-gf0-pr1/UTCB/0h_yAQ/AQ/8290624f-4149-4be2-9501-9e2395d2f5ed/2/kltmHL4TAy
Resource
win10v2004-20231215-en
General
-
Target
https://click.pstmrk.it/3s/www.123cards.com*2Fpick-up-ecard*2F*3Fcode*3D4684550111e*26utm_source*3Dtransactional*26utm_medium*3Demail*26utm_campaign*3Decard-recipient-gf0-pr1/UTCB/0h_yAQ/AQ/8290624f-4149-4be2-9501-9e2395d2f5ed/2/kltmHL4TAy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487973581846952" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4672 chrome.exe 4672 chrome.exe 3264 chrome.exe 3264 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1092 4672 chrome.exe 16 PID 4672 wrote to memory of 1092 4672 chrome.exe 16 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1356 4672 chrome.exe 47 PID 4672 wrote to memory of 1388 4672 chrome.exe 46 PID 4672 wrote to memory of 1388 4672 chrome.exe 46 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42 PID 4672 wrote to memory of 2020 4672 chrome.exe 42
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.pstmrk.it/3s/www.123cards.com*2Fpick-up-ecard*2F*3Fcode*3D4684550111e*26utm_source*3Dtransactional*26utm_medium*3Demail*26utm_campaign*3Decard-recipient-gf0-pr1/UTCB/0h_yAQ/AQ/8290624f-4149-4be2-9501-9e2395d2f5ed/2/kltmHL4TAy1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffcf31b9758,0x7ffcf31b9768,0x7ffcf31b97782⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:22⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4932 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3348 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:82⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3772 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3604 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3476 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1892,i,18431237201760329094,5132372998560500521,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d891cf430dc6b9cb6392d3814b8faba6
SHA1483394a989425d9c7d4b41625586726027b634b4
SHA256298820b9f48ce2f4cd97529e73d6cbbda75fc578503920389f1b753118bc856e
SHA5129a93fe1fb250a17628f7ed7f2c8ee0853a4c172ba446b9ddaf650a65840f932b7832fb4b4c0568066fdafed86c0dff74618a5ac58ac4e9281b98f64ebbc554f9
-
Filesize
6KB
MD5ffa13b02eac5990c6cf8b74ee9e52695
SHA1d8c7c7b3d808671f2e4a1c792d7b090c02e9d954
SHA256d350ab9cfb80e0d8c279ef1ca2daa57aac5e0dae8329daa5adf7d3746686d667
SHA512943d755f4c014482aad1242f570988e2ca0a21de0c9cd3a6b0c263b216fa50b843ffb1efd621389e2cdfcf2810e7e0f75a3277d0b89ac1ffe1c4e190fc652aa5
-
Filesize
114KB
MD5336881689ac163f1de77bd8af7f57e43
SHA1dc5193b2ce1ab40b106ffa2c86115518605f23d9
SHA2563ce3c5534965a3b1970078d8f8b9eb24d0e07182d8206f98217aa12d131aeecb
SHA5127db635fa9821a8944a87b8cc6c5f358d8f6a8092cbad12a2a8e46da337c3c60061fac84b530824bff0c073c129042a280e0c875cb312f7171e2cf5e638b88cf8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd