Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//thepanamahomeslistings.com/cn/nicole.mason/bmljb2xlLm1hc29uQGxvY2t0b24uY29t
Resource
win7-20231129-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506775553529897" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1580 chrome.exe 1580 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1580 wrote to memory of 3168 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 3168 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 1660 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 4828 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 4828 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe PID 1580 wrote to memory of 2428 1580 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//thepanamahomeslistings.com/cn/nicole.mason/bmljb2xlLm1hc29uQGxvY2t0b24uY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa22239758,0x7ffa22239768,0x7ffa222397782⤵PID:3168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:22⤵PID:1660
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:82⤵PID:2428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:82⤵PID:4828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:5028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:4536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3864 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:2440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4656 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:3040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3368 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:3088
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2884 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:12⤵PID:4652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:82⤵PID:1340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:82⤵PID:1196
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1884,i,5298641155570028689,16765790070135040150,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5d13eb0af67ee0617b3864b8f90046325
SHA16cd357985df24cb523df306c727dc41ee18dc9e1
SHA256a3b9cd9ca418fc3b7246815b0ab31e1e0b4dcafe9983eddf4afc1bf8d599c4f1
SHA512568e474604d8ddec4fbf6b3342d6d29f57be399b0ee972462ca52908f9470980e9c7896538b807c65820e14e57a7a353927d244dc8c24add3cede14b87e3a494
-
Filesize
96B
MD53b2007a201b1a9a342917d5a65717d12
SHA15db3e5970bac7f921c7da9e80a57ee81c988ac3e
SHA2569ecea87c94c85c4ffa0df8000c98a1165a72e158ae655ed04ace81d4d51f09ca
SHA5121d20556cd847d463b6ac334c39922038bef0fc366c86678303949d79683079ef708542d1719ae360ff8b88b01c540b0eb0f7dab692cc5d680ab17eedd660fe3a
-
Filesize
1KB
MD527235a40d30ceaa264626dd0429ad4ed
SHA15f10acbcd8d07c2872a5aee1c32eada3e0eb5c45
SHA25677bf23689ed9fa051832a65c545b068ac40080809fecb77c173c0521034d6e66
SHA5128fa719fb43595922b469424cb2b3ddecd1bfa1bb812229ecad5c4e32fda53a71dee302cf7e239f533fb442351a72afd2c3f081548d0ae11680af73b12291507e
-
Filesize
1KB
MD5f695f430d7d495b7bf632bee90ecbbbd
SHA19843d4c8fdb0ebdf8d9d4fbb95c83baffe8d1659
SHA2568aeeab479a5448b3116a23e8c011293afb6d5dbfe7801748e76c0042c1791faa
SHA5125185bdf13d039d9a366417d62095d1e4ce424f47b840668df0ea6a1a771e2d6bcb7ddd1983ffbab7e0735fb0795c6336fc1c97de1ef8ece0f5da0d8cc15a6c54
-
Filesize
6KB
MD541729f7b200e67a6a6e8cedf772aa704
SHA1f0208b2d540f10ffe050f368b079ff2163d15329
SHA2565eb6e13916cd4daa9ea2ee94cb2a928972d9bb205b10c338be83b26deec67498
SHA51285364b4989f28dd7ba5a1447b04786116cf7c511412f29bfe9537d687f599c40d3c45c655f595ce02c87e288b7cbce72b31653d090cb2a022efeffe6568cbf45
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e