Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 06:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://send.net-events.com/index.php/campaigns/so6763oxj161e/track-url/br043who5t74c/559c3af0291ffe40a19eff628f43d945b86c42c8?utm_campaign=website&utm_medium=email&utm_source=sendgrid.com
Resource
win10v2004-20231215-en
General
-
Target
https://send.net-events.com/index.php/campaigns/so6763oxj161e/track-url/br043who5t74c/559c3af0291ffe40a19eff628f43d945b86c42c8?utm_campaign=website&utm_medium=email&utm_source=sendgrid.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133521945770751536" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4392 3512 chrome.exe 84 PID 3512 wrote to memory of 4392 3512 chrome.exe 84 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 3144 3512 chrome.exe 86 PID 3512 wrote to memory of 4680 3512 chrome.exe 88 PID 3512 wrote to memory of 4680 3512 chrome.exe 88 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87 PID 3512 wrote to memory of 4760 3512 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://send.net-events.com/index.php/campaigns/so6763oxj161e/track-url/br043who5t74c/559c3af0291ffe40a19eff628f43d945b86c42c8?utm_campaign=website&utm_medium=email&utm_source=sendgrid.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff859ba9758,0x7ff859ba9768,0x7ff859ba97782⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:22⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4972 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3420 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=900 --field-trial-handle=1880,i,8174027990570877632,15802577977658089749,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de37c132c0d76bde053fee146d7c03ae
SHA15932ce6f9a3eab7330142373cf5cc51cfc5ca566
SHA256674d09d46fb0da0f4540f2a2551ebab28071d2960496511a9c154182f6f5093a
SHA512e87719289f7fee7b9ea53f862be557301fd8f33d8928e1a68309dff1ca7d46c310b55a15bf7384dbcd08fc712197e0ebfd8866a8afcebbfb35782d4f9491cd9e
-
Filesize
2KB
MD5754f9701b2053003f7e1250c3e87b4de
SHA12fbe6264c73fc2e8f8323b75859938ba86ffeba8
SHA256bdafaaa7c03fe0675b83272ecc90aa62877f0ffbce649b55c37d6e2e7823ef18
SHA512fa7cb6d21d4f112fbe1d48b0a4e0b2bcd918d08b8b1796f1b3a8660b905a6bc30c4e0ba30a2d36b8991def548281f91c04d9c0c6a7eaad1afc27dd3c10dd2b8e
-
Filesize
1KB
MD5c8147aa244d5a61e7f7c960d1c845dcf
SHA18cd82fe373e32fced6ede46a70ca4bbf4758945e
SHA256f7537729572db6e6681d1fe42b69857e2610d26e56c913aef2d1f7c67399f0d2
SHA512a625416977e08ffb138cc5f1ed75172696a89544e599ef8a19f8ee158a2bcc72b741b3acd2bd996245c266a589ee32e1bac31bc4f3c0485e1ba1f60ebc8942c0
-
Filesize
1KB
MD5132dbd1966767187ba9f8fb8ba3a7f1f
SHA1e6377ade7ac3d7619763ca2e696487f471a1c157
SHA2565f68039dccb6082487d23adca138cba12bc5ad1be9f6f4977272b0405eb9bae7
SHA5125fc2c71558a801ee42cdbc0fd156d1e7793ba7fd79d50203516c452027d5806436428a0c10fb44ba425ada864be268f59064d9270d2e157db8463ff4074c787c
-
Filesize
6KB
MD53ceac888c595a9fa0a646b14dd1cdee2
SHA116052b5c9627f2673952f4e204e0b54d0462a36b
SHA2560f7677fa0603a4da131065ab69188551a6f3bde2a2d7266255c041dc4d8fbe4f
SHA51247054b9f278f312e266ee7226d16578b43c395c95a962e6451095e44cf52694fed1d2538258166fb83d17736c7f8825a9f6d33e3562315f56481cd538f52cf2c
-
Filesize
114KB
MD51c533a2092bedf8cad1fbc556f555f13
SHA137bd91d373f63bf39ade7feca36f0cb048b6c550
SHA256687fd226dc5fe545284f99cee2d83f05906db22bc39132037abbece9abc9ddd3
SHA512b5731ffb07688c2b136bc6658276bdb05c8776cdde084da906b1595820d85ba6295f5778753d6e3502067906591887579df10b9d8e88b4f4666c87350202b865
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd