Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 09:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://directfundingcenter.lt.acemlnc.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZkaXJlY3RmdW5kaW5nY2VudGVyLmNvbSUyRg==&sig=DwJmk9yUsNxzCmSM7UavmXdM5EoHZm2TYdTwbWEzeunA&iat=1706810496&a=%7C%7C651851885%7C%7C&account=directfundingcenter%2Eactivehosted%2Ecom&email=oeONSqLApR7EvJsjrs9x9q2o8I1ScgbghBwp6Uq4Em6Ls6faIfvN0H3E%3AYWftfYAtLFA200%2FafiiMqEuSJuKKhaL7&s=2f5375ed59f0193cc86ac0c8019816bc&i=760A782A8A2346
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://directfundingcenter.lt.acemlnc.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZkaXJlY3RmdW5kaW5nY2VudGVyLmNvbSUyRg==&sig=DwJmk9yUsNxzCmSM7UavmXdM5EoHZm2TYdTwbWEzeunA&iat=1706810496&a=%7C%7C651851885%7C%7C&account=directfundingcenter%2Eactivehosted%2Ecom&email=oeONSqLApR7EvJsjrs9x9q2o8I1ScgbghBwp6Uq4Em6Ls6faIfvN0H3E%3AYWftfYAtLFA200%2FafiiMqEuSJuKKhaL7&s=2f5375ed59f0193cc86ac0c8019816bc&i=760A782A8A2346
Resource
win10v2004-20231222-en
General
-
Target
https://directfundingcenter.lt.acemlnc.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZkaXJlY3RmdW5kaW5nY2VudGVyLmNvbSUyRg==&sig=DwJmk9yUsNxzCmSM7UavmXdM5EoHZm2TYdTwbWEzeunA&iat=1706810496&a=%7C%7C651851885%7C%7C&account=directfundingcenter%2Eactivehosted%2Ecom&email=oeONSqLApR7EvJsjrs9x9q2o8I1ScgbghBwp6Uq4Em6Ls6faIfvN0H3E%3AYWftfYAtLFA200%2FafiiMqEuSJuKKhaL7&s=2f5375ed59f0193cc86ac0c8019816bc&i=760A782A8A2346
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513383173351555" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4868 1356 chrome.exe 83 PID 1356 wrote to memory of 4868 1356 chrome.exe 83 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4668 1356 chrome.exe 91 PID 1356 wrote to memory of 4164 1356 chrome.exe 90 PID 1356 wrote to memory of 4164 1356 chrome.exe 90 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94 PID 1356 wrote to memory of 2324 1356 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://directfundingcenter.lt.acemlnc.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZkaXJlY3RmdW5kaW5nY2VudGVyLmNvbSUyRg==&sig=DwJmk9yUsNxzCmSM7UavmXdM5EoHZm2TYdTwbWEzeunA&iat=1706810496&a=%7C%7C651851885%7C%7C&account=directfundingcenter%2Eactivehosted%2Ecom&email=oeONSqLApR7EvJsjrs9x9q2o8I1ScgbghBwp6Uq4Em6Ls6faIfvN0H3E%3AYWftfYAtLFA200%2FafiiMqEuSJuKKhaL7&s=2f5375ed59f0193cc86ac0c8019816bc&i=760A782A8A23461⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba93f9758,0x7ffba93f9768,0x7ffba93f97782⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:22⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:12⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 --field-trial-handle=1952,i,1149080042443633083,4191262234617538659,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a93ad25e887b63eafec0f97bfd8a4271
SHA13bbd88df18352f4b88ec0cc20727385326464283
SHA25632b64f0cd372e44e5fc093c70f4d8e2cb56dcbf87e6b5bcb78a68137793d13e4
SHA5126dbbd0f44063143a29d7c5002c8eab8d58851d2fca2caa97ab06df8451de2d9dbb57d44eb7631c06cffd4cc77f3abeb709a9f0f9ef22c51df09c85422b93fa00
-
Filesize
2KB
MD571d351aa23bc0d4a2c5eb5b8d6cb53c0
SHA1fdfdd1907dbe4afdd37eb91136f4f35d2a2eeb2d
SHA25619024346b4c20d490b4cfe438823ed3d2fbd8e0d026a4669017d6f10401535ca
SHA512ca1e28b320ba4c14a4792d8d26bb95e51e3e323c101fe047ae7171401a56f79dc118ac4d8bc9218a33a81d0cca1658d7161a6c3ba42423951259af44d0d8c25c
-
Filesize
1KB
MD5f7772a453b7c789b3eaaa249e0970af3
SHA1e6ed380c2c740c1fb7d18d26df00bfc3c47092a5
SHA256ca31615d0dae9d457d30ec9fe7d1201d486bc740da22c8be4f4ba38534cc0948
SHA512656e26676f57e8034a6d67bd017723cbd4eea9c3e164c024ba5de5e29d9b9a33010cd25b65bc505ba6fedb06303bdb6d5e2172cde20a8273152bf2b7a2bf50c7
-
Filesize
6KB
MD5f146eb2d01cf8b20f9854339ac19b4de
SHA15f6e2ae20949713f69a1e569d4454a0651160c62
SHA2568fdef5a4e4e8ca753510a444af1a66701b76d69ac5254be73abdf61277a90668
SHA51218b8e1c39441fc8fb673b602aa41f9ce3f833de5e29e8527f6fa9ae1ff25dd5812f438743333aba77ef5290085d9a647620d74400e51ba2d310ea0159302c9d7
-
Filesize
114KB
MD52af00c4d1467120c6639276c6642b035
SHA180254a8f1a37f2215686cd1c891893859a58039c
SHA256ce8a3f84d4fbdd881722fcd3000d9877f1f43fa43f553872ae762d58aa9c0472
SHA512ceb7373dd711c5342b8e6f0de09bcabafd030fa0df96775d2794a52cf102b80e202322757e76a5d9509b07bae564c2d55eb8f90c4365f55dce2aabe55dfd9429
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd