Analysis

  • max time kernel
    168s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 13:20

General

  • Target

    https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff9987e9758,0x7ff9987e9768,0x7ff9987e9778
      2⤵
        PID:1176
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:2
        2⤵
          PID:3596
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:8
          2⤵
            PID:624
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:8
            2⤵
              PID:4824
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:1
              2⤵
                PID:3408
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:1
                2⤵
                  PID:3984
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:8
                  2⤵
                    PID:840
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:8
                    2⤵
                      PID:620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4592 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5088
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:3692

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008

                            Filesize

                            100KB

                            MD5

                            f134fda98a277b1c8f20ab8fbe2fbd58

                            SHA1

                            a922796190a1f5bbb3c410c6ec591502050df04e

                            SHA256

                            27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

                            SHA512

                            2b2e8338afb9b0ca9b5fa3d452dfd80368b5d17566120ae6351b6d03572e5a69cedb97f165fbc31ffb3addcc00506a3fc0761cf2404a5d9826a8448a7c4d9f17

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            72B

                            MD5

                            2cfe693c94d63d2c5cc90a57e81ae214

                            SHA1

                            83b24cadb0bf494d775ca7cb0b509276c43ecd27

                            SHA256

                            dede9aacb577d603597b3ae123196cff6c0e26448ee41319913ac1416ad2475d

                            SHA512

                            a985ca4fcc7dbc18cf4dc0f67d28278b731c86edfefcb766151cc1b82722a974843c41b04e20991bd56517ba89c41941cb8366e5b24ecfbdceec99304015a628

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            02e5432f4774e71fc074b182b780eaef

                            SHA1

                            f53598bf5d0177d2989d8918e84540c5e77fa05f

                            SHA256

                            b027c6a8aa05f4f40010b44b142e3ae7594dde4b56021183e75f529b469213f1

                            SHA512

                            b7a79b3cdf67383e9c00010c29b5e34a890a5b2b2ba3712db114c21cfc9130c9efb64a7064767b40a8d7f0277291990dab60129b992951d1c796dab675e678ad

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            534B

                            MD5

                            46b2e8bba8a52656eb642d0ceb65a747

                            SHA1

                            fa2bb7c425c41a48d51eb3d06772c9c64cbbc24d

                            SHA256

                            daebaeae1ebd6dc110d594402bbb59aef4d5fbcb1433e2c06e7610a8e6db42b6

                            SHA512

                            345e5541196fe7ba490a96f34303c2be1a0f4a9347776fce26011249213019c04a7c36341ff9b2df15510d9359625ba6c909b7c55948e27f426e8e499a8747e0

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            868B

                            MD5

                            efe2d2d496b8a53f151e7ea69cebe438

                            SHA1

                            4380e27e0845733bd257b4ce289f4e9c57aa8b65

                            SHA256

                            bf8d386a266f0341bc47c7c00b566d655f8bb1b515815a89342d4895301987e9

                            SHA512

                            08a5113b4fc34a975aaaee137fb814a3f29f9000b9155642fbd3a5a92dbdc0239bd6fc5f85d8579c392b49f0694d6ba22bdcae1ab185e1dad56310264cff50cb

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            0fa7854faac9eaf0ed2b1121719ceaea

                            SHA1

                            389f2069d9f56563b89554c30953cc3a702154fb

                            SHA256

                            34f40117d6b9a9dae47209bd446ac8c142eda9b690ad86caf9d890c87c7dea69

                            SHA512

                            bc4484b66493d2eb3380dbc9ad404eab8e7886806edb2d9adc56cbc5b25a762cfd2011e980ce7cb39f7319bba4e8569f9469bf524724c532846ea129d12c7f0c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            2c5513cfdf28bcede735043477b0a823

                            SHA1

                            a2fc5bbbe79f8e4c15ee847de242d55a0d629a53

                            SHA256

                            dbd89966c956960763db930753d17e52ff0399c8648d4de38767b1f25949af51

                            SHA512

                            cf90d1e3cf3d19ac0d91a1dbf15159df26ce08dce5bb6fee84dae984b01c156fdad107cb1a1a80c284303fef7b707cf25618c48dd15ae70e01caa71774632753

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            20b15348c3f27a884589af00433da90a

                            SHA1

                            9156fc433738311ba50640cb47bd5c27827db307

                            SHA256

                            73f775fd9bee17d88ca87a5520e9d3b0c62bbb131c582eb326f9408bfe11249d

                            SHA512

                            2370f2c3e912f9d738b591872b11f7b55e474ed6c40f9ce9797a98c71004134f4fa8d73d4ace6b8fc10ad5fe3ec92ffac6b72a286ec93be7b379058a88a15280

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            114KB

                            MD5

                            20e9e7d05a8883acfd251b71253d74e3

                            SHA1

                            a4a417513dbe2145ee558aca9584066990276570

                            SHA256

                            0404bfeff66394713415e25f254cb517273028f5e890bf6383b381e5f96d5802

                            SHA512

                            d023b2680556d5540ba555b1aa8864bbcaa641428ae16308066aceabaf8bb66f24022aec022954162323159477f8c768fdd4b1b8087107b17b3f62c9a3cc34c8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd