Analysis
-
max time kernel
55s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 13:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://track.smtpmessage.com/9145951/c?p=cg9BmK8588xnAhWb5rCZLnO2MHEx9i6LppsNiOkfn6rWWvAA1gahpE445ddSOMRVC_kKaQ0zjQztaNNlc1wwd-J9sV-moEKGEOW910IEf7JAtXpMQsV-dxRa6GsW5iaAmWp9uZjoffEZ1jRWgFnvvR9eMF-ukO7RW6TgS7xljtmmm74RSAa3bNZi0AimRldd
Resource
win10v2004-20240226-en
General
-
Target
http://track.smtpmessage.com/9145951/c?p=cg9BmK8588xnAhWb5rCZLnO2MHEx9i6LppsNiOkfn6rWWvAA1gahpE445ddSOMRVC_kKaQ0zjQztaNNlc1wwd-J9sV-moEKGEOW910IEf7JAtXpMQsV-dxRa6GsW5iaAmWp9uZjoffEZ1jRWgFnvvR9eMF-ukO7RW6TgS7xljtmmm74RSAa3bNZi0AimRldd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543776817760524" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1556 4280 chrome.exe 88 PID 4280 wrote to memory of 1556 4280 chrome.exe 88 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 3000 4280 chrome.exe 90 PID 4280 wrote to memory of 4796 4280 chrome.exe 91 PID 4280 wrote to memory of 4796 4280 chrome.exe 91 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92 PID 4280 wrote to memory of 3576 4280 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://track.smtpmessage.com/9145951/c?p=cg9BmK8588xnAhWb5rCZLnO2MHEx9i6LppsNiOkfn6rWWvAA1gahpE445ddSOMRVC_kKaQ0zjQztaNNlc1wwd-J9sV-moEKGEOW910IEf7JAtXpMQsV-dxRa6GsW5iaAmWp9uZjoffEZ1jRWgFnvvR9eMF-ukO7RW6TgS7xljtmmm74RSAa3bNZi0AimRldd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4b499758,0x7ffd4b499768,0x7ffd4b4997782⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:22⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:12⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4588 --field-trial-handle=1868,i,10991053294697667575,12707397575368457266,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD55b6962f5b73c98547dff0b0e073f5814
SHA177217f8bc5fb19ced446dc39d777c6029d256857
SHA2561c1cc1e72176e63d16cd83ca648139efcc9ffbcc9abdec2f7495cf61833f569e
SHA512aa3ec07d4af4475e5359e025e1ba9a7326a38a423bb128777ce44c655cdc64218a2af59f41bbf17731122c8fb433c679fd6701a928652f4826a51e51832c8793
-
Filesize
704B
MD537ccb0ce3d62bf7f4c3b63f58272064e
SHA1c25562218b8a8b51984d74c4e28e2797a2830097
SHA256412fa63c889677168c711f6029da4020b325cf2c7c8f6459eff401e18c9f421f
SHA512fe8b42da8f55df74523f266e157dce79dd8fa11f9c7cd1484038dc3f589fcdfe7ba24d3dfb637685033b438b250274dfd0c5b007a2ceffdaf380c51cad7e7fd8
-
Filesize
704B
MD5b32464d6ba2e5afefef39cf62ad7fa73
SHA16ebbda44ee1d46de57491ed62104025b801f3ef3
SHA256bde24c9575f1eab34c75bd0131ae79f111e50674fb3cee1d6f93a728ab164273
SHA5123f7d4ce3a5b5d496f958fa781fe22863dfd99eb3ce8aa82502d446e2fef1c82efaea5b057286fa58b9142b27dbe6ffcf682d41470dd8ca3edc10a142c4262b0b
-
Filesize
704B
MD56b0cbb5c156c1429de21337f4db64b99
SHA18595b52a42eac9a86c1ff88c449a182dce41ff13
SHA25644d5bd8f732859f1b1963745a0cb3d4defda495b8c943f8f14778cba026c6515
SHA512d03de9a917166849252fc2d49593e201f1bf2d293bd5d2bfdf6829f9cbf8650e31b048d089f88f0c091265588405e93b4a34857935538706842c649114a75bda
-
Filesize
6KB
MD5c1babf76a3fec2f636d00d7879740067
SHA15050a1b29a66a3df39ac091001d823b1ee4950f2
SHA256b2c003430cfe979a4610dbb51140825688863fa2399a8f470c91880861749286
SHA5121d5e188f120f83b7cf612699a4db8ef1b1ec259317a9a62c2a93b805e6334abab0714fea8c2160bbc029c6397ab9d78a0393bd5eaac816972a356790e8b51c3a
-
Filesize
6KB
MD50c9177776a9b06f0bbf8542fc46c5821
SHA119d052b6f2dc8a1d18e5067ddf4fefdde6113253
SHA25602867dcc6af33783cb5b0516cd1469b22184388de60e32d4afa2bea43cd339b1
SHA512623ca535c7035e2aa9a908cf5def248426e5de4bc29afe7e847ef4b0f4d215a5a43f5ecffa59d2f3af73b833c46748e0fe2cd7d540d25206209ac00a6b65200f
-
Filesize
253KB
MD5486434d2305e233e2a4419298939e425
SHA1773fa09dcf239a609abb9994c6fbba881fb02391
SHA2560c88f495ea1688d5612936ce4619efda76c12957a849e85e466c787fa6c2302f
SHA512097693ad84cdab866d925fcd1fc8033c91558c77977a6fb76563cd96c9a8ee20edaef9fead2c75c4ed45733046ba346506ff2b95c13ba2c0bcad5edc442b21fa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd