Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=[TPAS_ID]?//thepanamahomeslistings.com/cn/nicole.mason/bmljb2xlLm1hc29uQGxvY2t0b24uY29t
Resource
win7-20231215-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506784253889324" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 716 chrome.exe 716 chrome.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 1584 716 chrome.exe 85 PID 716 wrote to memory of 1584 716 chrome.exe 85 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 452 716 chrome.exe 89 PID 716 wrote to memory of 2400 716 chrome.exe 88 PID 716 wrote to memory of 2400 716 chrome.exe 88 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87 PID 716 wrote to memory of 4016 716 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=[TPAS_ID]?//thepanamahomeslistings.com/cn/nicole.mason/bmljb2xlLm1hc29uQGxvY2t0b24uY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff42de9758,0x7fff42de9768,0x7fff42de97782⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:22⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4772 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4744 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4576 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4588 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 --field-trial-handle=1864,i,787927291237778432,15809819840783547825,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5e6ab4132277f5308235651435ea7268c
SHA1406af5b6e2a8ebb73658ca011b840f63723a65ca
SHA2566b55fa9860734817a8003c2c909b3a37c79ca1acaa410e28e83c3201c6f13f52
SHA5127b310335eda543142be9dfe00b47ca6f4a78f0e06a61afcdbeb03099e20525b1f280f04d7ed414e116e7f341be47c965a54ceaf4c088d25ee66ecd540b78c625
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\daec09e8-df1e-412a-b50a-137ced7909cc.tmp
Filesize1KB
MD50507cb004f93c46fd06f6e502c9fb0d2
SHA195ea914c24c16b9eba710ec8283a41419c4d08f1
SHA256e9f3abd7787b7c9f41c0ad412c725369a11c1fa5c5cf13ecd2e962697c24066a
SHA5129c8966e269d37221907a467fb4a1555ad4e51d115a309c53cd7a9093616db0b7c36639736a5d3c22bb48a11ef746af205027b620198649025bc6d453ed0db2d9
-
Filesize
6KB
MD5e1304f7a0b7a9fc9a433af74464c82d0
SHA1750d1dd87a30ee65703bdf07bb2f2ab8ea0764a8
SHA256817fa8546dc53b5b911cdeace414e682bf0b1cd0944d8503e3683ed2deeff184
SHA5126aea80caca4c9d63db42d557475304d8ad54461a766d34cf6e8fb977920f758c993b7d838c20f41ebe05f019f058f1dd00bc86f615d0e667da0125982b284d62
-
Filesize
114KB
MD56ddf1732c4a4d282bdee02b4c6713607
SHA159a7ae20c84521521bc4b563cde9b58b4381d070
SHA25640f5a75c09d5eb1a85619e769a9dd0d1c3a355024d353824cd3330382e9665dc
SHA5124dadf13429c37eaab38c714f6b8be724eeb89cd3ced195f60eaaf60ea74673746a0ecf8b6d628c50690c42c29d165c6b67c6ef9ed48420aae091b595aafa432f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd