Analysis
-
max time kernel
13s -
max time network
11s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
19-01-2024 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url5927.smijournal.com/ls/click?upn=VO3BZeZiaJT27TxrbZQvRHvN5e3oO8d1Xb87b15z8FHOb555L7wPspLhA47WeJrvTiE0hPbEeHGc67qKYVFVhdHQQziwuCd7hN7mP-2Be2esc-3Dw4Xz_mxyXAZHpAsdsmZYaHoswNrDTt-2BvTsSiIXB-2BiIJNyDtQlh5dOFxSf2o44yTveKH-2BooS-2BGhJTG8ke-2BSMp2cHDu4y5-2FYiMcn5fVPkRLLTPd9Zhu22pQHs-2B6yxSVarkOGCQds1r080nLH3Y1AywwpTuhLAMWswvEEREiC2BwLskh3f34LZoYsH8u-2B0OKbzcobWOmOelsoZR3c-2B5FW5GXEgdEyQ-3D-3D
Resource
win10-20231215-en
General
-
Target
http://url5927.smijournal.com/ls/click?upn=VO3BZeZiaJT27TxrbZQvRHvN5e3oO8d1Xb87b15z8FHOb555L7wPspLhA47WeJrvTiE0hPbEeHGc67qKYVFVhdHQQziwuCd7hN7mP-2Be2esc-3Dw4Xz_mxyXAZHpAsdsmZYaHoswNrDTt-2BvTsSiIXB-2BiIJNyDtQlh5dOFxSf2o44yTveKH-2BooS-2BGhJTG8ke-2BSMp2cHDu4y5-2FYiMcn5fVPkRLLTPd9Zhu22pQHs-2B6yxSVarkOGCQds1r080nLH3Y1AywwpTuhLAMWswvEEREiC2BwLskh3f34LZoYsH8u-2B0OKbzcobWOmOelsoZR3c-2B5FW5GXEgdEyQ-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133501467156795039" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 952 chrome.exe 952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 2308 952 chrome.exe 38 PID 952 wrote to memory of 2308 952 chrome.exe 38 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 4824 952 chrome.exe 76 PID 952 wrote to memory of 1480 952 chrome.exe 75 PID 952 wrote to memory of 1480 952 chrome.exe 75 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77 PID 952 wrote to memory of 4448 952 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url5927.smijournal.com/ls/click?upn=VO3BZeZiaJT27TxrbZQvRHvN5e3oO8d1Xb87b15z8FHOb555L7wPspLhA47WeJrvTiE0hPbEeHGc67qKYVFVhdHQQziwuCd7hN7mP-2Be2esc-3Dw4Xz_mxyXAZHpAsdsmZYaHoswNrDTt-2BvTsSiIXB-2BiIJNyDtQlh5dOFxSf2o44yTveKH-2BooS-2BGhJTG8ke-2BSMp2cHDu4y5-2FYiMcn5fVPkRLLTPd9Zhu22pQHs-2B6yxSVarkOGCQds1r080nLH3Y1AywwpTuhLAMWswvEEREiC2BwLskh3f34LZoYsH8u-2B0OKbzcobWOmOelsoZR3c-2B5FW5GXEgdEyQ-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe16df9758,0x7ffe16df9768,0x7ffe16df97782⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=260 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:22⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2756 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3784 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3168 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2752 --field-trial-handle=1840,i,15796249867974803799,15851791976778669245,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d7711be906facc90ea1a258b4507bf3
SHA15217d867897a2dde045014ec147703ad762ec90c
SHA2569a6b7327476204707127ba5018d317869fa69ae9803588617953b32de4cf17a3
SHA512fcf0fa7379d0c98daa02688061aedfeadd5f37ef475b9cf8bffe19121e3b4d9c5989b3b88f0e97e7a55ef38e0a1d82284a27e59d47a5d651b63746abd50ffa58
-
Filesize
6KB
MD5685300cf894ccde5d9a9ebba6199332b
SHA10b7c2fc1814802106991e6b02085bb4fa0dd64e2
SHA25609d5aff9389354135cea2410983559fb129d08abc33ae49302560afc057b00ea
SHA51272ede01479a6016fb66bbcfcd8ba9e45c2d009a0305bb09244e6da0592c8048e9b218893eb0a3ba5fa38a1e9fbaf988d08e369617b118401c865158b7389ab0b
-
Filesize
114KB
MD50f67525e73e51bdf3a2e3846e6216cb5
SHA1d35b2121dbdc9239519f0eabcf07aa94ec4c98a7
SHA256ab52f0196240e84bcc4254a6aa2359ad6821ff25c135df42a8b6958a9a89e530
SHA512e1e861048c574ad72577e65986cc64230a7c4a88a51c8f21234d54bad047b5a1de1c8e19d6ae4bf78200dac7843baa2b886573b02c498b2a1216b035da288a84
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd