Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 15:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ad.doubleclick.net/clk;265186561;90846296;x;pc=%5BTPAS_ID%5D?http://ebm.email.americanexpress.com/r/regf2?aid=268935263&n=4&a=0&
Resource
win10v2004-20240221-en
General
-
Target
http://ad.doubleclick.net/clk;265186561;90846296;x;pc=%5BTPAS_ID%5D?http://ebm.email.americanexpress.com/r/regf2?aid=268935263&n=4&a=0&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3500 chrome.exe 3500 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe Token: SeShutdownPrivilege 3500 chrome.exe Token: SeCreatePagefilePrivilege 3500 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe 3500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3008 3500 chrome.exe 82 PID 3500 wrote to memory of 3008 3500 chrome.exe 82 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2320 3500 chrome.exe 84 PID 3500 wrote to memory of 2720 3500 chrome.exe 86 PID 3500 wrote to memory of 2720 3500 chrome.exe 86 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85 PID 3500 wrote to memory of 3940 3500 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ad.doubleclick.net/clk;265186561;90846296;x;pc=%5BTPAS_ID%5D?http://ebm.email.americanexpress.com/r/regf2?aid=268935263&n=4&a=0&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdccde9758,0x7ffdccde9768,0x7ffdccde97782⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:22⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2808 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:12⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2800 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4660 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:82⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=852 --field-trial-handle=1896,i,6533724177356059967,1199841790517882576,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536B
MD520dd3350aaf0996e33fe0d7ea0e05901
SHA163c43c5d98929fb0d508ff74712e7390c393c7d8
SHA256bfd5b06a805b3fd4d099559fee2ed97e3e5f1d147f70db9b760b53003d78059a
SHA51295dbd3ac59172108acefa9fb4b54c15cd9d1703b9db42471413ffbbac884afb85696884ca256bd00f08c1d188eb2d0231898134cc3ed3c04624e161e4aec731c
-
Filesize
6KB
MD5a39120e40c6fd8248e3e98d79ed77c5a
SHA1afeec733eaf05d2d0fdcb008d519ea18c5e61c57
SHA256107eed1b1b9f4596915ddbc4442b93596e96a606cd981bfa510eee9ffa2d4c9e
SHA512d0be211591ed20e61dbe81b5226fc755f33d0aba47c516ef900bd9beba0a8cb1cdb9b002bb7364ec593633a0daac46a9da08bcd84750e90945ff71c3d5564a3a
-
Filesize
130KB
MD594429d701d2ea7bd95b1086e274ac930
SHA1e4ae05a6d0cd2409a73aa61a1d124fbe925fed0f
SHA256bb23b0bcba8e8b6048bff96ff70b2d24d52bbbe7b62ad7e5525676d3cee24155
SHA5122beafb93e3ddb50944e894d3101257d87591834d4d831920b569407861f4777a3621bb8ede5880b3f6592cde317d0aeeb9b114684de1547dbd06598b4ba86046
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd