Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 22:21

General

  • Target

    https://sendpayments.us3.list-manage.com/track/click?u=bff76cbd49b2a6e45123b6aab&id=88e9e5827a&e=6578b4abd5

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sendpayments.us3.list-manage.com/track/click?u=bff76cbd49b2a6e45123b6aab&id=88e9e5827a&e=6578b4abd5
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7e669758,0x7ffb7e669768,0x7ffb7e669778
      2⤵
        PID:456
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:2
        2⤵
          PID:2212
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:8
          2⤵
            PID:3180
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:8
            2⤵
              PID:4608
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:1
              2⤵
                PID:5084
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:1
                2⤵
                  PID:1436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3980 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:1
                  2⤵
                    PID:3648
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:8
                    2⤵
                      PID:3752
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:8
                      2⤵
                        PID:2260
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2204
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3552

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              360B

                              MD5

                              661dc3d8a68bd2510ea55aed50503468

                              SHA1

                              ec06fd356481c832009327866b77bd7afb7cefa2

                              SHA256

                              34644dc9d59f43c0b7b42369becb8c3d7e39c14ff4b7d818cb26a25b588bbc39

                              SHA512

                              aed610ac9670818a0af39890d43f0bed17723688c04dcf9b08e9d49c9d4d9ae2575af93feb181934bd00bacebee8cde804313dda10b9802f8bdafc5bb87a520f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              d609181e33635b49006830b03306ab68

                              SHA1

                              c91f4bc2e777c6ffdcfd7acc20e49167ac8895e9

                              SHA256

                              fbe7a382678f37acdb8a4321b69ada776d4162141203a3988688c8b45c3b8d5f

                              SHA512

                              f0abaae4da737322d959b9ae23d574ffdd24693673b0223623fa652e80fbbadfcbdfd883c82d1815441da702cf1c9375def2f0b126d75962b06215da54887e53

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              1c9a378d6ab9911395e5d84052a89b02

                              SHA1

                              a4432694abafe45f8309aa0589a933e83d6db7ff

                              SHA256

                              9ddfd1ea4f31ca2fa52e0fab9ac46510f64189bb9a6af9772bb1e6176f85200c

                              SHA512

                              606b2c91d9f1b28f149254d5a3efa981985984adb7de0c79797c93563e579c0650568d14d3a99c7f9a9f66c3672ce7fe5ef9b249b03ce9d115b1b1df1c5b8b1f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              23103d38c5b889301d1d343091756737

                              SHA1

                              cec886f276b411fd1b829892efa9e44c02c324c5

                              SHA256

                              f697c7b2d98f9e64af9d000b55a80f34765d75f1880e025a3daee46316862739

                              SHA512

                              71d728e691d1589fa721ab6ed07182abc9a3351b70f53b68d516eb3085d7cf134d15fd0b6e6fa06dc837fc174cf43043ea384e1dc56c6b05feccda98fca5c5c9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              9a2c1b64f7c57c6ec1da9790cbe7191c

                              SHA1

                              d2342e9cd23f5b9d0aabcdb27b51d56f0a2205e6

                              SHA256

                              1211474d00a0f2f0d02c1f3e141f8fd55ec4bd40a4a66c261a6c62b226ceea57

                              SHA512

                              1d91ee38118cee52ee8a785739db6b70046c0dc9b564a2d190c3944c1bcc5a7d5061f7ab3512b58a9a1a587de45700becf4bbefd59ef78dc4bcb36385fdb98ea

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              114KB

                              MD5

                              1b8cf653d09b00a6e3eeaac503a66438

                              SHA1

                              8057523189520e74e0556f8c6f45b762387b9727

                              SHA256

                              a231ede0f3df6ff44088961d72e1a1024f7daf68cd260212fe2ab2015a30d134

                              SHA512

                              d92ac88e6df9545d556cb62c9cfd4240ed9379a29330be18677c937b2a071735e0329c7b42c28b3212bdbcdb66ec609244be6fce793c52494fa5917ce438070f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd