Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://webportal.magnatech.com/unsubscribe/ontrackEmail?d=eyJhY3Rpb24iOiJ1bnN1YnNjcmliZSIsImVtYWlsIjoiR0FJTkVTQEJFU1NFTUVSLkNPTSIsInRva2VuIjoiMzIwOWM2ODAyYzRmODkyMGIzMjVhMjFiM2FiYTRkYjdiMGNkMTE2NiIsInByb2R1Y3QiOiJPblRyYWNrcGx1cyIsImFnZW5jeUlkIjoxMTQzLCJwY2MiOiJHM1YwIiwibm90aWZpY2F0aW9uVHlwZSI6Ik5PVElGSUNBVElPTlNWMiIsIm5vdGlmaWNhdGlvblR5cGVEZXNjIjoiVW51c2VkIFRpY2tldCBub3RpZmljYXRpb25zIiwibGFuZyI6ImVuIn0=&l=en
Resource
win10v2004-20240226-en
General
-
Target
https://webportal.magnatech.com/unsubscribe/ontrackEmail?d=eyJhY3Rpb24iOiJ1bnN1YnNjcmliZSIsImVtYWlsIjoiR0FJTkVTQEJFU1NFTUVSLkNPTSIsInRva2VuIjoiMzIwOWM2ODAyYzRmODkyMGIzMjVhMjFiM2FiYTRkYjdiMGNkMTE2NiIsInByb2R1Y3QiOiJPblRyYWNrcGx1cyIsImFnZW5jeUlkIjoxMTQzLCJwY2MiOiJHM1YwIiwibm90aWZpY2F0aW9uVHlwZSI6Ik5PVElGSUNBVElPTlNWMiIsIm5vdGlmaWNhdGlvblR5cGVEZXNjIjoiVW51c2VkIFRpY2tldCBub3RpZmljYXRpb25zIiwibGFuZyI6ImVuIn0=&l=en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3816 wrote to memory of 4464 3816 chrome.exe 95 PID 3816 wrote to memory of 4464 3816 chrome.exe 95 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 1404 3816 chrome.exe 99 PID 3816 wrote to memory of 3848 3816 chrome.exe 100 PID 3816 wrote to memory of 3848 3816 chrome.exe 100 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101 PID 3816 wrote to memory of 3220 3816 chrome.exe 101
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://webportal.magnatech.com/unsubscribe/ontrackEmail?d=eyJhY3Rpb24iOiJ1bnN1YnNjcmliZSIsImVtYWlsIjoiR0FJTkVTQEJFU1NFTUVSLkNPTSIsInRva2VuIjoiMzIwOWM2ODAyYzRmODkyMGIzMjVhMjFiM2FiYTRkYjdiMGNkMTE2NiIsInByb2R1Y3QiOiJPblRyYWNrcGx1cyIsImFnZW5jeUlkIjoxMTQzLCJwY2MiOiJHM1YwIiwibm90aWZpY2F0aW9uVHlwZSI6Ik5PVElGSUNBVElPTlNWMiIsIm5vdGlmaWNhdGlvblR5cGVEZXNjIjoiVW51c2VkIFRpY2tldCBub3RpZmljYXRpb25zIiwibGFuZyI6ImVuIn0=&l=en1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffb778c9758,0x7ffb778c9768,0x7ffb778c97782⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:22⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4688 --field-trial-handle=1872,i,11544436006172237371,2067958590418314872,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2272,i,1589057049575649654,2929151440327217574,262144 --variations-seed-version /prefetch:81⤵PID:5992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5c5539f0d2e5f043e35c6915725e0d529
SHA1d5d14c7b4f4146bb090c1dbe3b33a4477540f347
SHA25662f0c887151580d0a6ede28adde217dc2274013e64046da76e9a292d60118d90
SHA512f3701cd1dda584ec9f38903f9ca8a5b1b4a15e91a25e09c452de9356e8c9fc35aba835282472c506582968494d58ed5763d01d8072cf52db96e48b026d6d8641
-
Filesize
168B
MD5c9ee12da1a847dea11a94122e7ae82e8
SHA157366fe012169d2e7d7dcfcd8636325324c0e365
SHA256ac59db55ec08826dd3add603d7e01c221ee1b1f2433d3d1e2353fc1890ae2683
SHA5126171a2d1e7cbbc348de2e6e70a069314f8fce4c2134fe47ee6b83ef5654404da38ab00a3a1faa75f0e8b1167cf76ae50c228a3225f51754ee45e6bb97056d595
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5aab4b9f-1316-408c-a643-bffff91f5af7.tmp
Filesize872B
MD511ef3cacf032cbfc5d1f84498a09be0d
SHA18754314e5e20e0e30dabace5ad219852147fae70
SHA256e568165b2f437ab55c85e8b2f9987c4de0d1e1e3070d2b4eb61e65f4cb031a29
SHA512e6126c8cc23ae863e7008de4cc11c91416682b4177413aa41ed03cae4c3fae51d235fc11995028608a02db7eaf94c3968d5b0c0d4546cedd9bcc9df52e42a851
-
Filesize
1KB
MD51c3d4d9301945a4e582e07488df3d48e
SHA1019db7aa02e623c816835e7f031775c70b3d7956
SHA256175ff508b6e4ef688613d2a5bdc31507eabb27a01c8791ee6644d191b990eff4
SHA512f707db17015f7dae2b5aa126164051e395c71c05f2aec95a4c2e7516eefbcf6822e9fa695fdda5752c1a330c1ec2d4c2d9dd0150e79f6dca019807a7e3986299
-
Filesize
6KB
MD56c77c6b85eafaeed1717f6365729dda4
SHA16a234d8be2169348915ab786cb37e38c69521537
SHA2562faea7c454660657c991429b7cd3f8c0e837683f8bfa1a597ad5c90b41413709
SHA5122cee831d5cf6546f687dde0b74e4786ccb98d7d252194ff0dae2a218e98c6daf31150bee554f7eeaa92c45f3773f3a29d3b980bdf769d98e0e7556fafc4ff8c3
-
Filesize
128KB
MD5de5d9bbd9a4910b13af06e1959a8da8b
SHA12bc2acb6e726665be7c801e1ae492dbe80e4ef67
SHA25635d1a171d3974330f97724070cb7d569ed07364ad5c0774156ee97fea37b7d79
SHA512692acad718f0fa5f1d5ba83ab73a7c816bc77f48c5408981891bc67ce6da3aec2e357402637a49e3154811016a59fe9e966bc83a8095b5e79aedf694c5b97d95