Analysis
-
max time kernel
601s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://track2.sendcloud.net
Resource
win10v2004-20240221-en
General
-
Target
http://track2.sendcloud.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 468 chrome.exe 468 chrome.exe 4488 chrome.exe 4488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 860 468 chrome.exe 24 PID 468 wrote to memory of 860 468 chrome.exe 24 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4568 468 chrome.exe 87 PID 468 wrote to memory of 4760 468 chrome.exe 88 PID 468 wrote to memory of 4760 468 chrome.exe 88 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89 PID 468 wrote to memory of 2152 468 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://track2.sendcloud.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf8629758,0x7ffdf8629768,0x7ffdf86297782⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:22⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 --field-trial-handle=1852,i,17067632542440192519,17460736772916711298,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD57329b8cf0cb2d7a060ef45ee2099e7cb
SHA186a6a04aff6ad3aa8fffb2e9b83c4884a16da355
SHA2562ff16863b067cd4f628ad64a7006ae00ba9fb6bda11e7df852cff4a2074fc2b6
SHA512dd0cb16e20342c33cc2400d16684bfbcab587ea56194d2a210535d7bddc7eda7de9f697328a91bd1be503fab3a75de7bbc661b450a28c47e3ffa9b1e297237e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\2945a771-4b5c-416a-89ca-e6d3fed90299.tmp
Filesize873B
MD59312b7a018b08085b59d1b74af48810f
SHA118a50b36d9f2d2803cfcf7d0cd7b589db9727001
SHA25698e286cd7e51e7fc01bd4e5b4e2a9368b8debbe8a2d376eb5885d640fca74adb
SHA512429f90e4e6cc3978240bc0625a44e2a7a4e04626a6d56ee659586bce332232fde16dd1f2cdb7b30accc6889c8b176ac61cbfab6d7b467af9ced1996fb24748ae
-
Filesize
1KB
MD53a7ba61c3cf6f1ff567c5719aabc7ab8
SHA17f107c472b79f4c2515a7d6df82114149c0c6791
SHA256cf8715206813d811f1c8ed542d693b8174feaf579901c813bd35572e30102a23
SHA512634233ee90423e4b55d0aaad54aa99f11d9a730e5bf70802ed4437e6ea1cd1fa33618f15528e7c9daf60f67bbc2a241177f0346610b3a272876dacbe879d8b32
-
Filesize
873B
MD579dc4ab757f7f6867c2fe0ee26e3d026
SHA1f5ae1b470072356a85ca0cf920533c1c93cf8e51
SHA2568a3bf29a7c823c7d02ab8d0087b8e1916762191cce578343f9b6327b7ad1c75c
SHA51227371c138fb5c4d3b71a6089a0cfdb0834cd29d8f0211dd31289024f1bf9744120733a0d49755e3e1f5957ae3a5d3c60a1dc7d4cf55fef3fcb45bf99e6037108
-
Filesize
6KB
MD508a87785f0568e44d5a1307149c21257
SHA1a8fe63c922655bbe17f4b9a002180d153e097ad4
SHA256d8761557e623091d1d033b8c07e981336d6c767456920ab40e916d4d80ea31f4
SHA5128ba00e9933bf3e73ba0d2f998d4a491166975db722f97ebf611795b6d16c76627d79f157474d10bc8cafaaac909282f9ca492d37da12cb10667fd76c5ce46235
-
Filesize
130KB
MD5384ee3ef2396a212e900b32c8c29a3d6
SHA11504cbd5c06995cf7361668424d5ebce282c8c39
SHA256717fe0e1024d378a0ca3cf35383e68c857adf6c4c6e93a0b01350ad2076db55e
SHA512b6f31a29b76bd850d67a8a2ce798c143a79424218e6539d5c9977f0b8b1b6de38353caf4ec9ba10a8421312fce441bf15c24b37824204d620b1e2295fe02554b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd