Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 22:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sendpayments.us3.list-manage.com/track/click?u=bff76cbd49b2a6e45123b6aab&id=88e9e5827a&e=6578b4abd5
Resource
win10v2004-20231215-en
General
-
Target
https://sendpayments.us3.list-manage.com/track/click?u=bff76cbd49b2a6e45123b6aab&id=88e9e5827a&e=6578b4abd5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528549593203872" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 456 5064 chrome.exe 62 PID 5064 wrote to memory of 456 5064 chrome.exe 62 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 2212 5064 chrome.exe 86 PID 5064 wrote to memory of 4608 5064 chrome.exe 88 PID 5064 wrote to memory of 4608 5064 chrome.exe 88 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87 PID 5064 wrote to memory of 3180 5064 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sendpayments.us3.list-manage.com/track/click?u=bff76cbd49b2a6e45123b6aab&id=88e9e5827a&e=6578b4abd51⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7e669758,0x7ffb7e669768,0x7ffb7e6697782⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3980 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1896,i,5700239101583291644,1407245970891078984,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5661dc3d8a68bd2510ea55aed50503468
SHA1ec06fd356481c832009327866b77bd7afb7cefa2
SHA25634644dc9d59f43c0b7b42369becb8c3d7e39c14ff4b7d818cb26a25b588bbc39
SHA512aed610ac9670818a0af39890d43f0bed17723688c04dcf9b08e9d49c9d4d9ae2575af93feb181934bd00bacebee8cde804313dda10b9802f8bdafc5bb87a520f
-
Filesize
2KB
MD5d609181e33635b49006830b03306ab68
SHA1c91f4bc2e777c6ffdcfd7acc20e49167ac8895e9
SHA256fbe7a382678f37acdb8a4321b69ada776d4162141203a3988688c8b45c3b8d5f
SHA512f0abaae4da737322d959b9ae23d574ffdd24693673b0223623fa652e80fbbadfcbdfd883c82d1815441da702cf1c9375def2f0b126d75962b06215da54887e53
-
Filesize
1KB
MD51c9a378d6ab9911395e5d84052a89b02
SHA1a4432694abafe45f8309aa0589a933e83d6db7ff
SHA2569ddfd1ea4f31ca2fa52e0fab9ac46510f64189bb9a6af9772bb1e6176f85200c
SHA512606b2c91d9f1b28f149254d5a3efa981985984adb7de0c79797c93563e579c0650568d14d3a99c7f9a9f66c3672ce7fe5ef9b249b03ce9d115b1b1df1c5b8b1f
-
Filesize
1KB
MD523103d38c5b889301d1d343091756737
SHA1cec886f276b411fd1b829892efa9e44c02c324c5
SHA256f697c7b2d98f9e64af9d000b55a80f34765d75f1880e025a3daee46316862739
SHA51271d728e691d1589fa721ab6ed07182abc9a3351b70f53b68d516eb3085d7cf134d15fd0b6e6fa06dc837fc174cf43043ea384e1dc56c6b05feccda98fca5c5c9
-
Filesize
6KB
MD59a2c1b64f7c57c6ec1da9790cbe7191c
SHA1d2342e9cd23f5b9d0aabcdb27b51d56f0a2205e6
SHA2561211474d00a0f2f0d02c1f3e141f8fd55ec4bd40a4a66c261a6c62b226ceea57
SHA5121d91ee38118cee52ee8a785739db6b70046c0dc9b564a2d190c3944c1bcc5a7d5061f7ab3512b58a9a1a587de45700becf4bbefd59ef78dc4bcb36385fdb98ea
-
Filesize
114KB
MD51b8cf653d09b00a6e3eeaac503a66438
SHA18057523189520e74e0556f8c6f45b762387b9727
SHA256a231ede0f3df6ff44088961d72e1a1024f7daf68cd260212fe2ab2015a30d134
SHA512d92ac88e6df9545d556cb62c9cfd4240ed9379a29330be18677c937b2a071735e0329c7b42c28b3212bdbcdb66ec609244be6fce793c52494fa5917ce438070f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd