Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 10:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u7954726.ct.sendgrid.net/ls/click?upn=loqtEQF55znQaB0qI4fFLq4R6V-2F9dS6mm8UxP2HcXlVq-2FM4gBHZOQamxjTGisZb-2BC-2B1fWmWb5QwAeGohk9jtBZ2e5jv2Wd8bx9uHJkmNeFtAYkkApBr-2Fxfy5pL6XQnCp3-2BnUsNTwD3QNnKc9oRjIBBNIILYhXLgp-2BPAqp7FKNZkxjElVjMcT-2FW91NDk6fw-2Fd2Zmw-2F7P4r2PAyaB5mWdEMGPiFJoxbYHsIuEf2E3-2BGds-3DG7Xu_tOUDmUF7
Resource
win10v2004-20231215-en
General
-
Target
https://u7954726.ct.sendgrid.net/ls/click?upn=loqtEQF55znQaB0qI4fFLq4R6V-2F9dS6mm8UxP2HcXlVq-2FM4gBHZOQamxjTGisZb-2BC-2B1fWmWb5QwAeGohk9jtBZ2e5jv2Wd8bx9uHJkmNeFtAYkkApBr-2Fxfy5pL6XQnCp3-2BnUsNTwD3QNnKc9oRjIBBNIILYhXLgp-2BPAqp7FKNZkxjElVjMcT-2FW91NDk6fw-2Fd2Zmw-2F7P4r2PAyaB5mWdEMGPiFJoxbYHsIuEf2E3-2BGds-3DG7Xu_tOUDmUF7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528999401214226" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3484 4744 chrome.exe 84 PID 4744 wrote to memory of 3484 4744 chrome.exe 84 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4448 4744 chrome.exe 86 PID 4744 wrote to memory of 4192 4744 chrome.exe 88 PID 4744 wrote to memory of 4192 4744 chrome.exe 88 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87 PID 4744 wrote to memory of 3068 4744 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u7954726.ct.sendgrid.net/ls/click?upn=loqtEQF55znQaB0qI4fFLq4R6V-2F9dS6mm8UxP2HcXlVq-2FM4gBHZOQamxjTGisZb-2BC-2B1fWmWb5QwAeGohk9jtBZ2e5jv2Wd8bx9uHJkmNeFtAYkkApBr-2Fxfy5pL6XQnCp3-2BnUsNTwD3QNnKc9oRjIBBNIILYhXLgp-2BPAqp7FKNZkxjElVjMcT-2FW91NDk6fw-2Fd2Zmw-2F7P4r2PAyaB5mWdEMGPiFJoxbYHsIuEf2E3-2BGds-3DG7Xu_tOUDmUF71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ffb5a759758,0x7ffb5a759768,0x7ffb5a7597782⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:22⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 --field-trial-handle=1912,i,16019642096491726673,13560921734944347555,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5ff892be8b541305068e84c0e61041396
SHA16243fc6331b7e46d4c5565298dcfdac4b4764279
SHA25617e36582e2304ed06c2f3fbc90f2e554d24bbedcfd5c0483c0664ca071a48b0b
SHA5129071d9954efc81ea9328ec5e3b94b997f20f7213237b2a480461500c9e0f0da4a9e63a8b8e757335abf12ec876e4bdc4a3d695fc41ff83a090107cd856b3232b
-
Filesize
6KB
MD5cb22df96614880d4e003cc8fdb23652a
SHA115c58745125c7d715df2e1c9cf43818f3b0784a0
SHA256cf009d4e6a6c672569cb9aa8b7275250dff62d47da2d80bc7de6830088c7856b
SHA512b69646a9dcf621703e7a022212866b1eec54cd1d6a3ab5b2c3e992c9b78ed938b5067724489332b9978aeb32f027c5b1b9b8226c9a71303da2d9473c4da56778
-
Filesize
115KB
MD5d3c2a9d2c94ade1b3668b02b08506a39
SHA19d74cf6c368ab9b0d84b8d8717adf0c0ad39a780
SHA25625ab7f63119be4b1695e0cd739883bfe5800f261abe5dd6721643b3e4ecf7cb3
SHA512f0690dc87e96e4cd54b7bde776ecad2a6d27fe0eb134def5bd799587ee72c536c66e6248c50c7444d5b183c43092ae928dc082915b24d709c4b2d3d803cd9e52
-
Filesize
115KB
MD56cdaa5a8bc608ad03988830735b20b53
SHA1a98cc8a2bc8d441e30a3ddffb8c81527fc0b697a
SHA256c18e09b483b67af32b5dab43edec0f5f6ec39a8ddcd6470a67a60e5cfb4f26d5
SHA51290fb511703415e676fb61fdc522cd371a29d1b49e72e8e7837c67be13c7f3a7a5ff2018d3c91f1f58a8b35ff8524f8b9d802d6ed21ce1443fff9054c5ee7b5d3
-
Filesize
116KB
MD5d4112212c569209023bc225913a4f006
SHA17b7de16d1a9b6ec54cf05e606d4c29b6d04434fb
SHA256a6729520f9eab2edad4eab8b9420289b2a1623f2259195c6726162a3aecc2324
SHA5125fbca57997f05a264de77f5f62058708d5114ed7a5c508b50f5046ffb8ce79e4c453e8fb255eb92e426f6a7218745e197fa395ad4f82bdd7cd76dfe966c22cdc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd