Analysis
-
max time kernel
599s -
max time network
486s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 15:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=disruptmla.com/winmx/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/547/dth/ZGlhbmUuZnV0cmVsbEB0ZGNqLnRleGFzLmdvdg==
Resource
win10v2004-20240226-en
General
-
Target
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=disruptmla.com/winmx/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/547/dth/ZGlhbmUuZnV0cmVsbEB0ZGNqLnRleGFzLmdvdg==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543849828366703" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2484 chrome.exe 2484 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 4376 2952 chrome.exe 87 PID 2952 wrote to memory of 4376 2952 chrome.exe 87 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 640 2952 chrome.exe 89 PID 2952 wrote to memory of 4052 2952 chrome.exe 90 PID 2952 wrote to memory of 4052 2952 chrome.exe 90 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91 PID 2952 wrote to memory of 852 2952 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=disruptmla.com/winmx/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/547/dth/ZGlhbmUuZnV0cmVsbEB0ZGNqLnRleGFzLmdvdg==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63229758,0x7ffa63229768,0x7ffa632297782⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4720 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2948 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2956 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:12⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 --field-trial-handle=1584,i,16797787102190856303,14626360437440861452,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD59f5c43bf13b5876abcb02073060ab80b
SHA14195e0f0eade252ba7d308f41721487ef5dde2a7
SHA256e2f6b42144ce2b2aa5347f4299ad0be6041f346873293753ae01956efaa021a4
SHA512906959d0b6c4998a733d98f1d9f36bbb952f978d068a537f53f0ac43153f3bc88583e0ee42383cf3fe1422dcdecbc760efd1532b807ff130e7994e7078094fbf
-
Filesize
1KB
MD5ce226af027dab62245ebfff30740e2e4
SHA108a30754c3591ca55715d77ccc7b50fa5cd5d292
SHA256218c02758f7a3dff05e7ec601142d53c0462df7514938af1ddd7377a1aa5f3a7
SHA512e3fa8c95cfbf1d38602296b53e3f230030fcf27d30b807e3258cf56a5a696638e7dcd7b622b81e5682da1988e66ea864b2850708df6be6156fed5b64bd9c9af0
-
Filesize
6KB
MD5adb4252957ecadb87db6d1fd60934672
SHA1f418bd20de0b1809d1ade28ca597ffe07d42b138
SHA256acfee7bef42ea4b488c6827f55afc1a81e61477c32e3d85cc6d44eec68a3fea1
SHA512b980bed9a1131a22ba1fa1c94769efe2ebf8d3aafb7f7af1e6d4d0584f07a20058358058d288201395b6452ffe1288db485fe7b49e05fcff5338ff2fbeb56e9a
-
Filesize
253KB
MD5291a4bfa8c1b0d3d900ddc26f308e5cf
SHA191883e328bfe1c23c2b0de44c625ae90f015842e
SHA256f57a75ca33af01a40daa8e57c589a4088776ddb8b9f496a7bf0bc09e1dade456
SHA5128a93f5837055b3e05ce6a07ce3ac042a35873bd9de114fc30b906bca571c7ca49c05ebe4ef6ccc7a84dba3083050c9e6e717b31781e12492eef0a7ccae5430a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd