Analysis
-
max time kernel
11s -
max time network
10s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/01/2024, 12:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2flink.mail.beehiiv.com%2fls%2fclick%3fupn%3dNQnnbEsrhH0xUvlB0%2d2FNVFdigBkHQ6a8qEf%2d2F%2d2BeVL5s7z0vmhPRfh7k9h3P0GAVdCTc7BvpW8CJLSJSgPrEZ6o4aCtP3CnmZfTl0ri9YO5ON8tfmxnB72nbFVSrdKPghuDJq6BF7neBlX8Vzi7OcKcHrh%2d2FG6%2d2FYqGwEMUlqEIyky7krZiyI9km%2d2BiugedbwyGHtRBxFK%5f1XzNm5ZIb9ZG2Kfwahymu9L1QnuuVewDQ3HUb0LGJAbSJ8fDEZj1%2d2F5dXBpdqNQd0XESlLDzO4hxcWiCdBFrDWKJi9L6DcSrWQlOpgsCip1C8yOb0tPpqA19QC8miHY59OCrFnmdrGZgRefHvpNVPNXQB63baGYmTz7YCL7nftXWME8Zj9Y3M1W8mMV7JfgZasFQM4Mi9p6DFnda9%2d2FIGEJbEewIV2rTtRzYkpQ7gL4Ve8U2IdWfleRPS7pwDnKhGqWaA2Shd4gYTo9F7cv36inHbpcAlzbwZ14X0qKIoZKrx3Rxi%2d2FGRLqqlmfTs9sj0E7PN0jYmbvD0ZRtpTTQYl8DhrtAklmeGASGxGDeaDwHqyqKI7P64x5813E1VYsDzGSfticm%2d2FYB5vxZupOAY%2d2F5tuG%2d2Be0ERSlX3d0OFhfOEaKR%2d2BBXjvPYBYx7j3tiZhuDQu0uLBe%2d2BNi2tReHerLNP%2d2FKkYg%2d3D%2d3D%23cnVzc2VsbC5qLnByZXN0b25AZWhpLmNvbQ%3d%3d&umid=958d2421-98c0-41f4-8ab5-b1547804b071&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fc95ac7b081122ab8744d33f6d4380a28b9b9d89
Resource
win10-20231220-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2flink.mail.beehiiv.com%2fls%2fclick%3fupn%3dNQnnbEsrhH0xUvlB0%2d2FNVFdigBkHQ6a8qEf%2d2F%2d2BeVL5s7z0vmhPRfh7k9h3P0GAVdCTc7BvpW8CJLSJSgPrEZ6o4aCtP3CnmZfTl0ri9YO5ON8tfmxnB72nbFVSrdKPghuDJq6BF7neBlX8Vzi7OcKcHrh%2d2FG6%2d2FYqGwEMUlqEIyky7krZiyI9km%2d2BiugedbwyGHtRBxFK%5f1XzNm5ZIb9ZG2Kfwahymu9L1QnuuVewDQ3HUb0LGJAbSJ8fDEZj1%2d2F5dXBpdqNQd0XESlLDzO4hxcWiCdBFrDWKJi9L6DcSrWQlOpgsCip1C8yOb0tPpqA19QC8miHY59OCrFnmdrGZgRefHvpNVPNXQB63baGYmTz7YCL7nftXWME8Zj9Y3M1W8mMV7JfgZasFQM4Mi9p6DFnda9%2d2FIGEJbEewIV2rTtRzYkpQ7gL4Ve8U2IdWfleRPS7pwDnKhGqWaA2Shd4gYTo9F7cv36inHbpcAlzbwZ14X0qKIoZKrx3Rxi%2d2FGRLqqlmfTs9sj0E7PN0jYmbvD0ZRtpTTQYl8DhrtAklmeGASGxGDeaDwHqyqKI7P64x5813E1VYsDzGSfticm%2d2FYB5vxZupOAY%2d2F5tuG%2d2Be0ERSlX3d0OFhfOEaKR%2d2BBXjvPYBYx7j3tiZhuDQu0uLBe%2d2BNi2tReHerLNP%2d2FKkYg%2d3D%2d3D%23cnVzc2VsbC5qLnByZXN0b25AZWhpLmNvbQ%3d%3d&umid=958d2421-98c0-41f4-8ab5-b1547804b071&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fc95ac7b081122ab8744d33f6d4380a28b9b9d89
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505720228246031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 168 chrome.exe 168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 208 168 chrome.exe 42 PID 168 wrote to memory of 208 168 chrome.exe 42 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 1676 168 chrome.exe 77 PID 168 wrote to memory of 2024 168 chrome.exe 76 PID 168 wrote to memory of 2024 168 chrome.exe 76 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78 PID 168 wrote to memory of 2384 168 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2flink.mail.beehiiv.com%2fls%2fclick%3fupn%3dNQnnbEsrhH0xUvlB0%2d2FNVFdigBkHQ6a8qEf%2d2F%2d2BeVL5s7z0vmhPRfh7k9h3P0GAVdCTc7BvpW8CJLSJSgPrEZ6o4aCtP3CnmZfTl0ri9YO5ON8tfmxnB72nbFVSrdKPghuDJq6BF7neBlX8Vzi7OcKcHrh%2d2FG6%2d2FYqGwEMUlqEIyky7krZiyI9km%2d2BiugedbwyGHtRBxFK%5f1XzNm5ZIb9ZG2Kfwahymu9L1QnuuVewDQ3HUb0LGJAbSJ8fDEZj1%2d2F5dXBpdqNQd0XESlLDzO4hxcWiCdBFrDWKJi9L6DcSrWQlOpgsCip1C8yOb0tPpqA19QC8miHY59OCrFnmdrGZgRefHvpNVPNXQB63baGYmTz7YCL7nftXWME8Zj9Y3M1W8mMV7JfgZasFQM4Mi9p6DFnda9%2d2FIGEJbEewIV2rTtRzYkpQ7gL4Ve8U2IdWfleRPS7pwDnKhGqWaA2Shd4gYTo9F7cv36inHbpcAlzbwZ14X0qKIoZKrx3Rxi%2d2FGRLqqlmfTs9sj0E7PN0jYmbvD0ZRtpTTQYl8DhrtAklmeGASGxGDeaDwHqyqKI7P64x5813E1VYsDzGSfticm%2d2FYB5vxZupOAY%2d2F5tuG%2d2Be0ERSlX3d0OFhfOEaKR%2d2BBXjvPYBYx7j3tiZhuDQu0uLBe%2d2BNi2tReHerLNP%2d2FKkYg%2d3D%2d3D%23cnVzc2VsbC5qLnByZXN0b25AZWhpLmNvbQ%3d%3d&umid=958d2421-98c0-41f4-8ab5-b1547804b071&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-fc95ac7b081122ab8744d33f6d4380a28b9b9d891⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd59889758,0x7ffd59889768,0x7ffd598897782⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3760 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4428 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2988 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4916 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3132 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3100 --field-trial-handle=1836,i,18172291101827211639,10240421980798790391,131072 /prefetch:82⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD532402d78ac3bd54c71ca9cfc053fe0e6
SHA15ff99dc215cf61796f346e3a4102599154cbe6a5
SHA25649c54da2889ea29b7a16c10c95ea46ad5a280f879cc7e1e390e81469bd22fc6d
SHA5127a64172eb625e16fd3be2b434d0465c32009b5454bc05587be1d6a7cc39f0f305ada5f7b71a423a08c6dcb220fcb5ae4cbb4cf077ed99787cdc1d25a52506882
-
Filesize
114KB
MD585ef141041cfa16a202f157ca9386552
SHA1e954fdcbb883ce337e92461467f92653ebaba838
SHA25634151cc943da503f125ae670a4661a3d2a5d6bc601bb5d64a5293a5758563879
SHA512848d7e9a3e59e50f90286cb6ad52e9ffa2bef132db8afb21b7e89904d444af3bbdbbb7fc9e75174d2aafd5902af7c394526abfb01d9770cbd03249e1f737df84
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd