Analysis
-
max time kernel
1s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 03:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://links.cloudera.com/t/102807/c/cf1337df-0a41-4fcf-ac40-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-cloudera-com-api-mailings-click-pmrgszbchiytkojxg42dinbmej2xe3bchirgq
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://links.cloudera.com/t/102807/c/cf1337df-0a41-4fcf-ac40-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-cloudera-com-api-mailings-click-pmrgszbchiytkojxg42dinbmej2xe3bchirgq
Resource
win10v2004-20231215-en
General
-
Target
https://links.cloudera.com/t/102807/c/cf1337df-0a41-4fcf-ac40-b99cf9042105/NB2HI4DTHIXS643BNRSXGLTDNRXXKZDFOJQS4Y3PNUXWC4DJF5WWC2LMNFXGO4ZPMNWGSY3LF5IE2USHKNNEEQ2IJFMVIS2PJJMEONBSIREU4QSNIVFDEWCFGNBEGSCJKJDVCNKEKVHUEWSUKVGFUUCPGUZVQT2MKRCE4USYLBFVURCGJ5FFCUZULEZVATSVLBJUKTCCINHDKWSHJ5EVEMSFJE2EOTKNJJKUQQKZKRBVSUSOI5ATER2FLFFE4R2FLFLUWTSSJZEEKMSEIFMUUTSHIFNEOR2PJRBEOWJUIRHVSWSUI5HFEQ2FJRBEGT22KNMEKNBTJJHDKWCDIVHVEQ2HKFJEGWKJKRKE4RSUKNCU6USDI5DE4SCNKJJFGR2SGJDFKVKMJBHFUS2EIFLEGUCQIVLVOTJSKNEEWWSDKRGTKRCGJVDFGVZULEZE2TCBK5KVSWBTKBHUMTSEIM3FGTKKKZLUONSQJJBVAVJ5HU6T2PJ5/sales-cloudera-com-api-mailings-click-pmrgszbchiytkojxg42dinbmej2xe3bchirgq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2660 1508 chrome.exe 69 PID 1508 wrote to memory of 2660 1508 chrome.exe 69 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 4088 1508 chrome.exe 95 PID 1508 wrote to memory of 1136 1508 chrome.exe 94 PID 1508 wrote to memory of 1136 1508 chrome.exe 94 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93 PID 1508 wrote to memory of 2656 1508 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://links.cloudera.com/t/102807/c/cf1337df-0a41-4fcf-ac40-b99cf9042105/NB2HI4DTHIXS643BNRSXGLTDNRXXKZDFOJQS4Y3PNUXWC4DJF5WWC2LMNFXGO4ZPMNWGSY3LF5IE2USHKNNEEQ2IJFMVIS2PJJMEONBSIREU4QSNIVFDEWCFGNBEGSCJKJDVCNKEKVHUEWSUKVGFUUCPGUZVQT2MKRCE4USYLBFVURCGJ5FFCUZULEZVATSVLBJUKTCCINHDKWSHJ5EVEMSFJE2EOTKNJJKUQQKZKRBVSUSOI5ATER2FLFFE4R2FLFLUWTSSJZEEKMSEIFMUUTSHIFNEOR2PJRBEOWJUIRHVSWSUI5HFEQ2FJRBEGT22KNMEKNBTJJHDKWCDIVHVEQ2HKFJEGWKJKRKE4RSUKNCU6USDI5DE4SCNKJJFGR2SGJDFKVKMJBHFUS2EIFLEGUCQIVLVOTJSKNEEWWSDKRGTKRCGJVDFGVZULEZE2TCBK5KVSWBTKBHUMTSEIM3FGTKKKZLUONSQJJBVAVJ5HU6T2PJ5/sales-cloudera-com-api-mailings-click-pmrgszbchiytkojxg42dinbmej2xe3bchirgq1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed3b39758,0x7ffed3b39768,0x7ffed3b397782⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:22⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5116 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3256 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3196 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:82⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3980 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5132 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3888 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4680 --field-trial-handle=1876,i,540938185274471140,17980644646683195451,131072 /prefetch:22⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3752
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 1ef3b1f6a282c1cec85ffd25d743ddb4 n6IbJaZFAkGC76ZzBJJu1g.0.1.0.0.01⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59513845d92150407bacd1175fb720e6e
SHA13992dc4331555d07d26c6b8cfcf0fcca0dcab43e
SHA25685ff79184f2711bc1c664cd1dcb04bb1e85977a01e868895258ec42b654eb6dd
SHA5122d20ab217304be64e41dbd13342457314c71969949610707cfa8ad438ef7859946b6e27988babe72579e86a456215714725ef8884e5d7a6ead983d63b8aa2ee4
-
Filesize
699B
MD56904d934fed319df018fe386cce87567
SHA1e65d1b4a127f9ef9661527644e57816c242fdda0
SHA256b1ddc482dd82574b40ae3ce39c440c8184aa55944fc63a121a57a06cfbf197f9
SHA512099073e53a8abd61034b73d7767f4c08c0c51b20122e13f643bdb965ec7085fbe54866f128b0d6ca9b3ef3deb2e13b41e58e02d4a1bbb572aeaa025687d861de
-
Filesize
6KB
MD50ed107c686adac8f459b1c0a5a319d0e
SHA156f4a2abdeb4b456b119cfc7f4b1357cfacda819
SHA2561547316f9d4b61cfa5f12286444d9df4c3421abc224135fb33ff3c50cf2852ae
SHA5123c559e2a5122151ad55092199455fb1827039b03032f1b914f3d1a0b402c9e73aeffc8a2fd4d530917e38aa6fff393f63134aa83b4ae3f67272a2103bfe44c9d
-
Filesize
6KB
MD51bc536747c02b9b3e94cda7da28c9856
SHA19fcfc14cecb96cbe73f04e793c5a1d58dff2e711
SHA256abb2d580c7d28f8c9662afe24f73697727d84c065937be8551bbbb73915a71ab
SHA512ac2f423c928f989d63fdd5d6be55b5863c9f119a37af40c94e41f3c678abfd570c1cad30d830dc94d027d17f2934455f04dc493d9e81234ffd150a448ba9f9c4
-
Filesize
114KB
MD59b667a6650f52c87579e0e5882d7a709
SHA1bd46e80d8989c0aea31bf2f55185d7479286e192
SHA256dfa64a0ac705b07d5d0180d49d2e655ac57e7242146fa3a1ca2b6cdc8ea483d1
SHA5124debbbb35669014aa4e22d5b521834d8693c7cf14674d80e0225aaa66aee572c7c2639934197e5ca53eed656b575caac505f598f6d99958a6367b4ac628e1cd2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd