Analysis
-
max time kernel
19s -
max time network
8s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/02/2024, 10:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ngdialogue.no/mmww/email.html?preview=aHR0cHM6Ly9jb3JlLm5nZGlhbG9ndWUubm8vdjEvZW1haWwvY2FtcGFpZ24vNDY0OTEyOTU1P3RzPTE3MDc5MDE0NzMmc2lnbj16NUxFOUpQT1luWCUyYjdVeVN0UWZVQk9Jb0VsMCUzZA%3d%3d
Resource
win11-20231215-en
General
-
Target
https://www.ngdialogue.no/mmww/email.html?preview=aHR0cHM6Ly9jb3JlLm5nZGlhbG9ndWUubm8vdjEvZW1haWwvY2FtcGFpZ24vNDY0OTEyOTU1P3RzPTE3MDc5MDE0NzMmc2lnbj16NUxFOUpQT1luWCUyYjdVeVN0UWZVQk9Jb0VsMCUzZA%3d%3d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523793078310108" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3868 2900 chrome.exe 76 PID 2900 wrote to memory of 3868 2900 chrome.exe 76 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4992 2900 chrome.exe 78 PID 2900 wrote to memory of 4544 2900 chrome.exe 79 PID 2900 wrote to memory of 4544 2900 chrome.exe 79 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80 PID 2900 wrote to memory of 3360 2900 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.ngdialogue.no/mmww/email.html?preview=aHR0cHM6Ly9jb3JlLm5nZGlhbG9ndWUubm8vdjEvZW1haWwvY2FtcGFpZ24vNDY0OTEyOTU1P3RzPTE3MDc5MDE0NzMmc2lnbj16NUxFOUpQT1luWCUyYjdVeVN0UWZVQk9Jb0VsMCUzZA%3d%3d1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff803fe9758,0x7ff803fe9768,0x7ff803fe97782⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=284 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:22⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:82⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:12⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1824,i,10104823120149400766,6859715523232182307,131072 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
866B
MD53a50a3ed505e2d13327055fd136e5c3d
SHA12611a1d7661071c9a0aed958e73307f0e39b5f95
SHA2569895affd338e5ad330b9430e73d799041465b07fddc4c3bb2ee0195b588cfe03
SHA512eec8c1d8517b2e458d6e5a4cdf2e266075cc6760fc816ab4c461088d310762e179ca076e03e4443f2d4235f50b1a9f4a68410e860b5d8b2c5e2aaaa92ffe1588
-
Filesize
6KB
MD5de802280235e8c837eaa2b06164ae3dd
SHA1901790ad75c0a1bc76ab0564575233e1212be505
SHA25653dc81855ade80ce72f4c5ef47cf956568d725032472a1f040b7463142b39ca5
SHA512672a0836d3fe49ce9e326efd4a40c479c72833555ea558e23892e034a5ad4d8ddc97e9c4b529f1096ee7ef61997898b5bf239a03ead5e80a6ccfea582f2a286d
-
Filesize
114KB
MD5a0b2a679179a8c0a6260f3000bb72f65
SHA194ccc18f2f38666088cbcc03c19d542bd69a575a
SHA25630d583922390d0f4b6a2c42157c1b09e393f8801c284dd2234c85500f14d1124
SHA512e2c2e548b66bb94e1b2126a260ab0555ca74bd9f45bc18d8708a74ad02ed0dd2ab753f7bbd2a26b686e95dc4fe5a38e36af55b5867610ebef905425c1e92c126
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd