Analysis
-
max time kernel
12s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 11:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//bharatmetal.in/jdjdhyeueieuidnbddd/ddhdhiwoiewyeueieiewbvdvvdcdd/nnddvduoeoeoeghvvsbsbss/30/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//bharatmetal.in/jdjdhyeueieuidnbddd/ddhdhiwoiewyeueieiewbvdvvdcdd/nnddvduoeoeoeghvvsbsbss/30/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==
Resource
win10v2004-20231215-en
General
-
Target
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//bharatmetal.in/jdjdhyeueieuidnbddd/ddhdhiwoiewyeueieiewbvdvvdcdd/nnddvduoeoeoeghvvsbsbss/30/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2736 2684 chrome.exe 28 PID 2684 wrote to memory of 2736 2684 chrome.exe 28 PID 2684 wrote to memory of 2736 2684 chrome.exe 28 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2708 2684 chrome.exe 30 PID 2684 wrote to memory of 2588 2684 chrome.exe 31 PID 2684 wrote to memory of 2588 2684 chrome.exe 31 PID 2684 wrote to memory of 2588 2684 chrome.exe 31 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32 PID 2684 wrote to memory of 2552 2684 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//bharatmetal.in/jdjdhyeueieuidnbddd/ddhdhiwoiewyeueieiewbvdvvdcdd/nnddvduoeoeoeghvvsbsbss/30/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ce9758,0x7fef6ce9768,0x7fef6ce97782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:22⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:22⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3580 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3576 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2676 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3692 --field-trial-handle=1164,i,12849545046765206391,17544064345201945106,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585e4d99db424485636454f08406b5233
SHA1841906937c64d6f5e8e5e753642daf367de04e6e
SHA25652b165b62b770d31f44ddee707eeb9298c370c07f710518c4305e40bd611e350
SHA5125dc1c622e30261d0624c667591ddab88afb88cca105d128495f4326a9014e4c4c6c699351cd276064177f184a2301d8c3216ebf649209781fffada8029595075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0d81370ad401cb7cea935cdc1de370
SHA1b3d84c0dc4ae9d3332ad6c9c261b18fca85c6799
SHA2560b658f3aa2f3fecb68f1d8956047b9d075d17afd9a4cab37ce6d65e63a348486
SHA5123dee1a6422ea048e0d75bfc3fe82043adca6b0780da5faa4e0bcb935b20658932b88e4e57333107e2d36a6a123af00b48cca30ebab4a035677d69b79496ddf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ba0edf85654013c30239d76d7a0c6fa
SHA18b542cce3157380ea74b1227efb1efb4df4649a1
SHA256b9ec65782a21e8aa784515947b6ab014c8c016175f1946fd11a1870a1c68231a
SHA51245d5a7437a028cbd5badb89f8834fee97d7f4cc35e2c70db337da5f94dc7c2ca503340ddc2b8f112d23be3bbf43b569b66a157e58355171677918c644660e6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54874957a1fd994c368cd99c9774098bc
SHA16b1924b005ab555bc5f5ca4ea1bf640bcaad0244
SHA2567149e2b448560df8ad7dcf60da6229ae710dc8fce5e7387075df68f21f33ccc8
SHA512f9f60d471062818e8e344e76c8908b6e7d73eebec39cbd6cbbcdbdb6f0d9ad9394e1cb24657e28f2d587d0ae424ea2655ca2aec2dcbe832a43642ae1619e2a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e77fa61989c5532014513d406fc5014
SHA11605efc8e80baa86e5c8b2e14b29c26404e9188e
SHA256a56d8b796f7341dc3215bd8448fc8762b069357a7222ba7538b5a45dad9905f4
SHA512c6a97fd49a5ce9cd2e1d8a36ad086f16f9fffcae1bfa78bffc6bb09c8334761788e2b057b402a2a199f91a087e2fe71b7a7d3f7d62fec59022f20ac060cc21b2
-
Filesize
4KB
MD5660384aa7e961fb21fcfdc00398a8ef8
SHA167ef031eb6b763e9208ff9f271f7535809b747b7
SHA256a034bd05be773b5fda2da497af5f200f88f49e9d4f51ca33c67d2dfaed4f3405
SHA5129941d0f77dcfe85b632a68ff9fdf22a15946e4432d9fe229bd3c2c29a066f39f13d543461e533cc54d921200495cae9f6a0079210d2af9c701ca69f5dd79997b
-
Filesize
5KB
MD51f2dce44b3401f9d78a5981cff8c7a5f
SHA1340f2f9649e1143864e50eab38e0e507e82e7e89
SHA256ed67114afd27bfa4f8d095df3e577fa9e0c515f044e1429610b9d40e2e8be93c
SHA512defa39607b11f1b07e889a3025c8764fe5f1771942ed836d8a92b0e16b8c22b51e7893d7de307ef6c8d0ecf6053804f1feb79974f787fd1dbbfb05110efb46f0
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06