Analysis
-
max time kernel
300s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 00:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://queue-inc.us21.list-manage.com/track/click?u=587c7beb4951741fa094d1b80&id=f9ca1db614&e=2a28ac1b6b
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://queue-inc.us21.list-manage.com/track/click?u=587c7beb4951741fa094d1b80&id=f9ca1db614&e=2a28ac1b6b
Resource
win10v2004-20231215-en
General
-
Target
https://queue-inc.us21.list-manage.com/track/click?u=587c7beb4951741fa094d1b80&id=f9ca1db614&e=2a28ac1b6b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504441405281343" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3532 1468 chrome.exe 85 PID 1468 wrote to memory of 3532 1468 chrome.exe 85 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4280 1468 chrome.exe 89 PID 1468 wrote to memory of 4576 1468 chrome.exe 90 PID 1468 wrote to memory of 4576 1468 chrome.exe 90 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91 PID 1468 wrote to memory of 3860 1468 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://queue-inc.us21.list-manage.com/track/click?u=587c7beb4951741fa094d1b80&id=f9ca1db614&e=2a28ac1b6b1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe84a29758,0x7ffe84a29768,0x7ffe84a297782⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:22⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1800,i,7850824953401673146,5504086796685985662,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD58323a578fdd6644439df8360ab85f8e3
SHA1e4e486b54063079c7f06319b909336b254182e2f
SHA2565788708d1c8677d606cf308b1035f5782cac777730a2d1b9effa848e98d8616d
SHA5126e2d224b498e696bac6ef69c96a0fec5f633e75e9323b7d1bcd2c64701dfb64dd5929f52e7e5801ae65b4ecc2d1daea537b4639b7373d9f47def0824fd863b0e
-
Filesize
6KB
MD5456d21a79facfb97a80c444ea6d578a9
SHA10a41c6fb39aeffdd47f5e2db315c1f5731530c22
SHA256288a4039510b97f4cf7047ac952db699aff0231e03a23ee80ec59578e8e905ad
SHA512e4efb6364b8bc6bdeb6479984215ebe1f1ae2da55760be6cef0de4aa0b25ca88fdf7e97ee5686875553bf9627bdd0127e02805e0988b59f732eb61333f2d3e4f
-
Filesize
6KB
MD5f6a86c8495d5235acfaff9c0043f5f6f
SHA1e9be35cfde8aaaa664e0b9ec2cb6ef61c73a3e5d
SHA2567435bc4c376d7c0afe699e72fb4d61a0cf1831da272b6c4e60a750bd71f1007e
SHA512ebbb60a795d194bf42c917883ed382913a870733f50284deddb95242c899a03e9266064401d8e70dc8f487a1b40cbb91b73a206b80cd560ca940288537bf1c7a
-
Filesize
6KB
MD561cfef32e5cbaf15286039dbbd2b1739
SHA1631b084387081cd99352020ba04fd0a635642941
SHA256c8db4a284ed670c6e1f5ad605e5fefbd7d4e0c622d4d642c381204056e3625ae
SHA5127cb2860eccd49e00d859a253981a5428da9b1ef67fc6c9c7f0cb2b73013d9a14ede2147f907666214b230f62a49b12d014eb45bbdf9a5e094f95a28b12e99dcd
-
Filesize
114KB
MD552af3d980cafc6d6e6fe1d644dff616e
SHA11b6ef5b3af2369952340ae4d94ba7ca808dabba6
SHA256ce0a4f01605980b5b2a4ae8349f8d0efa56e59c749936d7e303fabf40503823e
SHA512608ef80ac01421d69997020b95eed7571a632af8e5128bebf52f1351f5047a8bee30afe2870b15a8ed4922c35e2fa4cc41746b3e319e6fd8bcc1c57b9410cde0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd