Analysis
-
max time kernel
8s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 06:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url5549.relianceenter.com/ls/click?upn=O5-2F-2FZBEDzXm-2F7e9o0m42WT2zWYIEPbHGuYsnkd-2BMd8GVVOmtquybGA-2Bs2j3rt2MJRPNn_EIGm-2BLW0OhhXv2vaDO5x-2BP9-2B5DZqQBB9ORKBGno0rw7FvnyJMlxS4KY-2BfrYnonZT9QGB-2BNPhbIfhFoklc2DSHQ3mGSYlFWrGWkJsk6FQcEgV-2FkvDR7cWZLLeVVYKTouBUn-2BGJFXHVIWTPY4vEr12Qy-2B4a1Rd9zYpYtv1fbx-2FTav-2BQH9ZOs5QAVQoyOVXkjqzWmn068bxJM1DUjUUU5Y-2BBw-3D-3D
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://url5549.relianceenter.com/ls/click?upn=O5-2F-2FZBEDzXm-2F7e9o0m42WT2zWYIEPbHGuYsnkd-2BMd8GVVOmtquybGA-2Bs2j3rt2MJRPNn_EIGm-2BLW0OhhXv2vaDO5x-2BP9-2B5DZqQBB9ORKBGno0rw7FvnyJMlxS4KY-2BfrYnonZT9QGB-2BNPhbIfhFoklc2DSHQ3mGSYlFWrGWkJsk6FQcEgV-2FkvDR7cWZLLeVVYKTouBUn-2BGJFXHVIWTPY4vEr12Qy-2B4a1Rd9zYpYtv1fbx-2FTav-2BQH9ZOs5QAVQoyOVXkjqzWmn068bxJM1DUjUUU5Y-2BBw-3D-3D
Resource
win10v2004-20231215-en
General
-
Target
http://url5549.relianceenter.com/ls/click?upn=O5-2F-2FZBEDzXm-2F7e9o0m42WT2zWYIEPbHGuYsnkd-2BMd8GVVOmtquybGA-2Bs2j3rt2MJRPNn_EIGm-2BLW0OhhXv2vaDO5x-2BP9-2B5DZqQBB9ORKBGno0rw7FvnyJMlxS4KY-2BfrYnonZT9QGB-2BNPhbIfhFoklc2DSHQ3mGSYlFWrGWkJsk6FQcEgV-2FkvDR7cWZLLeVVYKTouBUn-2BGJFXHVIWTPY4vEr12Qy-2B4a1Rd9zYpYtv1fbx-2FTav-2BQH9ZOs5QAVQoyOVXkjqzWmn068bxJM1DUjUUU5Y-2BBw-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2232 2240 chrome.exe 14 PID 2240 wrote to memory of 2232 2240 chrome.exe 14 PID 2240 wrote to memory of 2232 2240 chrome.exe 14 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2616 2240 chrome.exe 23 PID 2240 wrote to memory of 2832 2240 chrome.exe 19 PID 2240 wrote to memory of 2832 2240 chrome.exe 19 PID 2240 wrote to memory of 2832 2240 chrome.exe 19 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18 PID 2240 wrote to memory of 2828 2240 chrome.exe 18
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6759758,0x7fef6759768,0x7fef67597781⤵PID:2232
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url5549.relianceenter.com/ls/click?upn=O5-2F-2FZBEDzXm-2F7e9o0m42WT2zWYIEPbHGuYsnkd-2BMd8GVVOmtquybGA-2Bs2j3rt2MJRPNn_EIGm-2BLW0OhhXv2vaDO5x-2BP9-2B5DZqQBB9ORKBGno0rw7FvnyJMlxS4KY-2BfrYnonZT9QGB-2BNPhbIfhFoklc2DSHQ3mGSYlFWrGWkJsk6FQcEgV-2FkvDR7cWZLLeVVYKTouBUn-2BGJFXHVIWTPY4vEr12Qy-2B4a1Rd9zYpYtv1fbx-2FTav-2BQH9ZOs5QAVQoyOVXkjqzWmn068bxJM1DUjUUU5Y-2BBw-3D-3D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:22⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1568 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:22⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2876 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3448 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2500 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2308 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1980 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3476 --field-trial-handle=1380,i,5702586311480345697,1798336349650515551,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9604d1e7198eae9d404e79898f42a70
SHA17114edfe862c44828be14f56042779583855d448
SHA256bfe3471772c4203f0c1bbab8058cb07318e478740efc7e5bd7aa588db2c85559
SHA512ae70688fd56b616fa402ef98fe12e7c5c6e80a75363a7831bf1649558ba4b2a3cc7d444f96153dd4da755fd745f54a8f20c4742bd33b8a8d00e65e68099841a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58557968530eec359b0b0a0a159147ea8
SHA1324ff0f8baf3196fc179bfbd0d8995f8785a97a7
SHA256fab1bf231ba287d73521e50e41122dc953ce2e91939f407ab946615160850b6e
SHA512b2ed6ba5757007f31f7988f0c4922922314b2b013313e55b3a8ee0f0d8ea75594dbaeefa3a2511d4ba90af19a793df3edf4464a5315e531eabe8149490a6fc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a53bb0d6d27ffde0087faae850e194f3
SHA1e1de9844998b60f1e9643fb879d3c148f9773401
SHA256db662d433a9410274472e8620446a89746e6c024f630dda56470f33fd309ab4f
SHA5123fa618734be979df850a34647873243b6304924a856a37c559aa692d5b88b17348f106951e65c9e3b9ac910bea94f1ab093861b21840689526dc91d311e107b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2970edc86fd65bf7bb2fd7ccf3d168
SHA1f43b26a58ff828b75c92907b9905e2e9f87f44dd
SHA256436104debf1337cd5abea1753ad30d4251acd0d980cad9e111a55dd96c4b2399
SHA5126ae82f220ddacdbfd1d86801f05799be697db9fbedc2cf88a44b924ae88a46de329d0e113933b3dc37abc68e49458cf673beeb07f5af4ddc6b27f0383d728689
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
3KB
MD594db920f2ff0532edbc60767907b5e05
SHA1fb3c161790fcc033606a4dfdabe4ac174235bb6f
SHA25692c2621e6fb83872d34050fbffad629f57c813f4aad4d7755a3d62d7992a32a7
SHA51264b9d0ce4b2e5bd5e40cb91e367492d9c403b347c1a456cff2f6a1e75f032d93343774a139e527389af801336e7f49f2522ea0a9f366da4d9cb38e1cc2c95c71
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2