Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ellis.smtptrack.com/unsub/qaR9ZGt3ZQR4BGD2ZQV2ZQD3BQx3Avf
Resource
win10v2004-20231215-en
General
-
Target
http://ellis.smtptrack.com/unsub/qaR9ZGt3ZQR4BGD2ZQV2ZQD3BQx3Avf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133526664840017922" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 688 4520 chrome.exe 87 PID 4520 wrote to memory of 688 4520 chrome.exe 87 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 1928 4520 chrome.exe 89 PID 4520 wrote to memory of 920 4520 chrome.exe 91 PID 4520 wrote to memory of 920 4520 chrome.exe 91 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90 PID 4520 wrote to memory of 1084 4520 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ellis.smtptrack.com/unsub/qaR9ZGt3ZQR4BGD2ZQV2ZQD3BQx3Avf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff954aa9758,0x7ff954aa9768,0x7ff954aa97782⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:22⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4644 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5100 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2928 --field-trial-handle=1876,i,10980149786776740568,15939476442896571190,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD56630ed1997ec35c4c1329fbd91e0eb2a
SHA1b88f2f0e75f3dceac85002789dbf7804dc6a5512
SHA256a66a38925173460638e37a098fad311e68bcc15651d4f953b99d0c35bd8ba7c5
SHA512b283ccbc355f66c89c0fbead43af3fc784ed1582c40e1146e5395bf61b3a12679ad2345765ab357072d9bc3c6d75ec4bec60656f89623172daa9693f9f6d9d13
-
Filesize
822B
MD579345565f72d7671f8b715c70369df5f
SHA1944f718a9bb0ad06e17e20da1b29228097009bce
SHA2569f77340a44076e76cf26cb43f19503055aa0aef8c9c1710bdf4fdac057bd325a
SHA512ac325d3c25d19a71aadca305daa5a2049f80d0b547361d1ac35f0a5efe5e07278787b4f053746f833fdc7772faf9a7fef849ef9c2ad995367da702fdb81fba6b
-
Filesize
7KB
MD5de0167f7fc5a948ca5651ea3cb1211de
SHA13e45c6fb9ee751241a99ffa4afd694039fc3fef6
SHA256c35647c8693b07a2b74a9b5711b78f3bde8ec2783dc1d0f9719957147eadd274
SHA5127d3d116e2e9032bf883d6da478d89f01d56be58b4407017ac921dae060a40e26fa5d88b0387f35bf6bc1170cc53a277abfa87d7a5b4b40d200410f9b36fb1676
-
Filesize
6KB
MD5049b9c095dab844685386edecdcd8da4
SHA1f5f4e4b79c2a9f8170198b110c2364929f74cc49
SHA25683b3f01632e1bafb408168ebf2b53199d091fc154b8fd6cc9e55d23095224668
SHA512fefe1925c950b98eb9b5c3a273838eeb64da4e7983c73cf50c00353a2729c1ed10f70e4a7f384116d28bc91831dc572412ee5955051c79eed5faba61fb86b7a3
-
Filesize
7KB
MD552773dd90cbcc6cfb7ff7899dfc0067c
SHA12ae877e314e776aeedb3c50d8220029dc7211953
SHA256759c0a927f6d79166d0e882d973dc23923e31a42a5c0d76dd128d48a708d2ca8
SHA51215cce9863fbda1ed3cd810b922643d63cfe0729bb86aaaef67fccf0c37f158909d6130ec6014fc73d644e5d1376d38db2e7ebb7c8ed2641b12829809fd684535
-
Filesize
114KB
MD5c56244e075681bf96bd30e04e2095e8b
SHA1f4fd848cd81c58d22bfdc39d4d26fc2388ad71e0
SHA256c43ab9456a1b2ced93df8b7463124dd238601b662050ec65fcfc562a2f81093c
SHA51204e83a38112aff03156538a6adc27b657d7d7a659992357441e91c3f530288db74201770278197db9b8dce9dd9bba4cd4e2ed3cc7246f30d560956e5394c45db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd