Analysis

  • max time kernel
    17s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 04:31

General

  • Target

    https://2n8w.app.link/?~channel=Email&~feature=ConfirmationEmail--AtocETicket&~campaign=WebToApp&~tags=locale%3Den_GB&~tags=version%3D1&~tags=marketing_code%3DBSH3675&$android_url=https%3A%2F%2Fplay.google.com%2Fstore%2Fapps%2Fdetails%3Fid%3Dcom.thetrainline%26hl%3Den-GB&$android_deepview=false&$android_passive_deepview=false&$ios_url=https%3A%2F%2Fitunes.apple.com%2FGB%2Fapp%2Fthetrainline%2Fid334235181&$ios_deepview=false&$ios_passive_deepview=false&$fallback_url=link.mail.beehiiv.com/ls/click?upn=DHNnCVt-2BYXCJEGCbBN6Kf3YKQEmI8Qt8rR1gTjJHASpATLyeIlvIT91BNjWRfeyOX2uQ0iCsAz-2FxlJiaBO8-2BdzlVkbHc0NpA-2FGrYIcZYYMyu0KterLtG-2Fo3Mia-2BYozbbnjCXF8wDc59iwLtEqMxm-2BPPWzjtDj7TBGHTZrTdeEJKDN6DC2T8QfxIR92LESbDMpt3Y_DC4y3DdDCeEScwRgaDHqvUt0mFohRF-2FgrOC-2Bd8-2FV4uQNXXRFmy8FSGQ1cwU8EVWCgPx1MrVNEd6v96-2FSxEpRZZRR3YsYQioBD-2B7ssn9hh31oEtD-2BueMNPMLeU29OgQqviY9ZvXS-2FnCTVKfCOkm7LLH-2FByJziTQtb8wFFDcfdhro5AqibYkjMmgYPXLSTgv3fogRJG-2BKk-2FWtHsHnNKnqKfU48kEfbg6Lxco2MgE-2FVGZy8jahxp0kJz3w2R4OiSU6W63BRaSj-2B7ZGJ5IcpM-2BrLPCJP4E-2BbYVY5YH9CZZoQlVlQQSf977Jr3IXn7fwNB5-2B69K-2FYbFddD-2BxD7-2BfjI4FMMRltbfSyaVT6qxWoE6WUzT4f0JaTpsNz41h1Iai-2B2SZqIpTjmNxrC1ZBDPGiEwFUob3yTdII7KCOhR20wrtpEaGzeFcB02CR0xDtOZAudRHITP733gRO6GcpRFDBDMSAcw-3D-3D

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://2n8w.app.link/?~channel=Email&~feature=ConfirmationEmail--AtocETicket&~campaign=WebToApp&~tags=locale%3Den_GB&~tags=version%3D1&~tags=marketing_code%3DBSH3675&$android_url=https%3A%2F%2Fplay.google.com%2Fstore%2Fapps%2Fdetails%3Fid%3Dcom.thetrainline%26hl%3Den-GB&$android_deepview=false&$android_passive_deepview=false&$ios_url=https%3A%2F%2Fitunes.apple.com%2FGB%2Fapp%2Fthetrainline%2Fid334235181&$ios_deepview=false&$ios_passive_deepview=false&$fallback_url=link.mail.beehiiv.com/ls/click?upn=DHNnCVt-2BYXCJEGCbBN6Kf3YKQEmI8Qt8rR1gTjJHASpATLyeIlvIT91BNjWRfeyOX2uQ0iCsAz-2FxlJiaBO8-2BdzlVkbHc0NpA-2FGrYIcZYYMyu0KterLtG-2Fo3Mia-2BYozbbnjCXF8wDc59iwLtEqMxm-2BPPWzjtDj7TBGHTZrTdeEJKDN6DC2T8QfxIR92LESbDMpt3Y_DC4y3DdDCeEScwRgaDHqvUt0mFohRF-2FgrOC-2Bd8-2FV4uQNXXRFmy8FSGQ1cwU8EVWCgPx1MrVNEd6v96-2FSxEpRZZRR3YsYQioBD-2B7ssn9hh31oEtD-2BueMNPMLeU29OgQqviY9ZvXS-2FnCTVKfCOkm7LLH-2FByJziTQtb8wFFDcfdhro5AqibYkjMmgYPXLSTgv3fogRJG-2BKk-2FWtHsHnNKnqKfU48kEfbg6Lxco2MgE-2FVGZy8jahxp0kJz3w2R4OiSU6W63BRaSj-2B7ZGJ5IcpM-2BrLPCJP4E-2BbYVY5YH9CZZoQlVlQQSf977Jr3IXn7fwNB5-2B69K-2FYbFddD-2BxD7-2BfjI4FMMRltbfSyaVT6qxWoE6WUzT4f0JaTpsNz41h1Iai-2B2SZqIpTjmNxrC1ZBDPGiEwFUob3yTdII7KCOhR20wrtpEaGzeFcB02CR0xDtOZAudRHITP733gRO6GcpRFDBDMSAcw-3D-3D
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65c9758,0x7fef65c9768,0x7fef65c9778
      2⤵
        PID:2076
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:8
        2⤵
          PID:2556
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1424 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:8
          2⤵
            PID:2772
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:2
            2⤵
              PID:2616
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:1
              2⤵
                PID:2452
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:1
                2⤵
                  PID:2436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1584 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:2
                  2⤵
                    PID:1396
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3432 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:1
                    2⤵
                      PID:708
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=1348,i,7509948785013878272,12482835627880605324,131072 /prefetch:8
                      2⤵
                        PID:1192
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:1924

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        Filesize

                        65KB

                        MD5

                        ac05d27423a85adc1622c714f2cb6184

                        SHA1

                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                        SHA256

                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                        SHA512

                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        1KB

                        MD5

                        a266bb7dcc38a562631361bbf61dd11b

                        SHA1

                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                        SHA256

                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                        SHA512

                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        304B

                        MD5

                        770ed89bbc0716893248a56dde949d08

                        SHA1

                        34e074010356bd6add92ebe1eb8c3c30fb900f58

                        SHA256

                        ef449b0d364fe0255a237880e5279aa31c8992845ed885ed68219afcb3e43e46

                        SHA512

                        cdc4b9d4efd2da4dcb0f6e46e01b1f5321474fa89d1dacc897fe058b690f100f616588553219f20b1213c3e5bbacfd70a2c338efdf97b46cd6b50194f2d9b5ba

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        304B

                        MD5

                        31d8fdb86dc560d35ff40a394ed5407c

                        SHA1

                        2d8bdcb2784ef0ae9bcee18f55b51d6fca9d29d2

                        SHA256

                        8fc446890f6d2ba4fdf5c062958cdaa1e5f2bc668d4ef197200eb750294e37ac

                        SHA512

                        3d1295fedcc4050029ed2a71b7f231ae1f25281ebe59899a5f92b31079cd633494d133f27f9835daa28f76378448ae41e8d1a47d636165eb23103ce305e5c3bc

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        304B

                        MD5

                        5d728b87800a31cab0821e8e92cbd77d

                        SHA1

                        ad179a988c9ffd364dcdd0012d1b24bb2d485719

                        SHA256

                        7f8ba5f7081b97b4fd3ba2afed747097e87d9ced633ca2c4259bbac35739b532

                        SHA512

                        73a157d6eec0cafdfefed0f035a6b61719d38ebdc9bf0596e71603bdab9289a7714327bbc6e8fba1875862a23ee35cff35e15a15a76be40d6ab2ffc5365cb6ba

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        304B

                        MD5

                        ab779ab6ef062691f944dcdfe9afb3fe

                        SHA1

                        915d961285393325abec36852a317f965b4bc3d9

                        SHA256

                        4986e72c58e1edb35b2d3450d8b502c3fc63b5daa5d9814d033dcbdb1ca982bb

                        SHA512

                        26f44b930f8dcffb31e2f64048699c3c70d6bc1174761c0f977b43d8a92692b828223adda83fe7fad2ac4a7c118f5e71c896a7c7c535d49c1154ffec7e68738a

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        304B

                        MD5

                        20dc06dcaa280c5e97ac98d21d82f364

                        SHA1

                        a44f63f0e5205649b436099377a92b0b00882ef0

                        SHA256

                        f47d5f53a1b889b76b5e4e871f7d4a900e3bfe7c249a73ac500c227dd96cc5fc

                        SHA512

                        fe0beb101895124976f8dcee79fc6d44fa83379d3659963f670b2ac48c4c28e39c85d73f6e2327d9590252e355eee52a40ee46e435ba1c927366e5d28f1f5bb0

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        242B

                        MD5

                        e5e9ed6dad6ef80c6ba5314b60e26a46

                        SHA1

                        91b8f328abf85a8df164433f6a4b7df208d42efb

                        SHA256

                        6fe16de3c54fbcd08d6b17da430bd2eb764211b5d8198755f6c779e8f94a3dc2

                        SHA512

                        b321ce3b46b521d75fa62fd0445965face2b836998762a796b5164d0c199e370d13ccc5176b0bd914e8922ae0bd586707f6927cec691facef9f35795980a1734

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                        Filesize

                        16B

                        MD5

                        aefd77f47fb84fae5ea194496b44c67a

                        SHA1

                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                        SHA256

                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                        SHA512

                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        a30f5c77eac50ed6c7449a8f35ec0967

                        SHA1

                        89c3281c223cb7c02fb0965d4c042b571d72b637

                        SHA256

                        e737ed0e611b07f0f7c691c4cc6f755ca1668a011fdee0153802690c483f10ff

                        SHA512

                        c9343bdf216af38b17b607d7a29b83dcf416df676bca40361f21db181370a61438102c42a0e44d20471741b0eac92c77749feeea75ef614f9d09d24b157c63b0

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        5KB

                        MD5

                        4ed6c3e1eca29c22ca7c4c093d72f297

                        SHA1

                        91805c0c615140e7ecd8e8f2898b9b73eb5e03e7

                        SHA256

                        77b1882c8aebaabbe57d51f0d5cb22d810eb0ba688d695bf6671e2fa13755d80

                        SHA512

                        7ec4aa14ee8d7961e37a539726584d51289570d67a838cb3926b5361897fa82b69b1a17a6fa66f41512c926a79dea3cd878791645d82ce055c4e93001110b828

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                        Filesize

                        16B

                        MD5

                        18e723571b00fb1694a3bad6c78e4054

                        SHA1

                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                        SHA256

                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                        SHA512

                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                      • C:\Users\Admin\AppData\Local\Temp\Tar1E7E.tmp

                        Filesize

                        171KB

                        MD5

                        9c0c641c06238516f27941aa1166d427

                        SHA1

                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                        SHA256

                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                        SHA512

                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06