Analysis
-
max time kernel
59s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2024, 09:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://xentegra.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ4ZW50ZWdyYS5jb20lM0Z1dG1fc291cmNlJTNEQWN0aXZlQ2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY29udGVudCUzRFZpcnR1YWwlMkJFdmVudHMlMkJOZXdzbGV0dGVyJTJCJTI1N0MlMkJNYXJjaCUyQjExJTI2dXRtX2NhbXBhaWduJTNEMjQlMkIwMiUyQjIwJTJCVmlydHVhbCUyQkV2ZW50cyUyQk5ld3NsZXR0ZXIlMkIlMjUyOENvcHklMjUyOSUyQiUyNTI4Q29weSUyNTI5JTJCJTI1MjhDb3B5JTI1Mjk=&sig=AJ8EQTwD51kbLDVNo3TmQDntPd2ZeNkMKxawUtX8xJJZ&iat=1710168769&a=%7C%7C1002524728%7C%7C&account=xentegra.activehosted.com&email=TsHS6hQcaFt1CRq0yTxsE0Pjryz9X4%2BhAPf94ohwOpZbdQUcDUHgmz0i%3AH142R%2F34quxQO4stVj90Um7lPAAGg0Re&s=4ed6088ee8a67c2d03d86a0c22e0b33e&i=465A488A3A5285
Resource
win10-20240221-en
General
-
Target
https://xentegra.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ4ZW50ZWdyYS5jb20lM0Z1dG1fc291cmNlJTNEQWN0aXZlQ2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY29udGVudCUzRFZpcnR1YWwlMkJFdmVudHMlMkJOZXdzbGV0dGVyJTJCJTI1N0MlMkJNYXJjaCUyQjExJTI2dXRtX2NhbXBhaWduJTNEMjQlMkIwMiUyQjIwJTJCVmlydHVhbCUyQkV2ZW50cyUyQk5ld3NsZXR0ZXIlMkIlMjUyOENvcHklMjUyOSUyQiUyNTI4Q29weSUyNTI5JTJCJTI1MjhDb3B5JTI1Mjk=&sig=AJ8EQTwD51kbLDVNo3TmQDntPd2ZeNkMKxawUtX8xJJZ&iat=1710168769&a=%7C%7C1002524728%7C%7C&account=xentegra.activehosted.com&email=TsHS6hQcaFt1CRq0yTxsE0Pjryz9X4%2BhAPf94ohwOpZbdQUcDUHgmz0i%3AH142R%2F34quxQO4stVj90Um7lPAAGg0Re&s=4ed6088ee8a67c2d03d86a0c22e0b33e&i=465A488A3A5285
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548819778709596" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 816 chrome.exe 816 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeCreatePagefilePrivilege 816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 4804 816 chrome.exe 72 PID 816 wrote to memory of 4804 816 chrome.exe 72 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 452 816 chrome.exe 74 PID 816 wrote to memory of 4824 816 chrome.exe 75 PID 816 wrote to memory of 4824 816 chrome.exe 75 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76 PID 816 wrote to memory of 3848 816 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://xentegra.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ4ZW50ZWdyYS5jb20lM0Z1dG1fc291cmNlJTNEQWN0aXZlQ2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY29udGVudCUzRFZpcnR1YWwlMkJFdmVudHMlMkJOZXdzbGV0dGVyJTJCJTI1N0MlMkJNYXJjaCUyQjExJTI2dXRtX2NhbXBhaWduJTNEMjQlMkIwMiUyQjIwJTJCVmlydHVhbCUyQkV2ZW50cyUyQk5ld3NsZXR0ZXIlMkIlMjUyOENvcHklMjUyOSUyQiUyNTI4Q29weSUyNTI5JTJCJTI1MjhDb3B5JTI1Mjk=&sig=AJ8EQTwD51kbLDVNo3TmQDntPd2ZeNkMKxawUtX8xJJZ&iat=1710168769&a=%7C%7C1002524728%7C%7C&account=xentegra.activehosted.com&email=TsHS6hQcaFt1CRq0yTxsE0Pjryz9X4%2BhAPf94ohwOpZbdQUcDUHgmz0i%3AH142R%2F34quxQO4stVj90Um7lPAAGg0Re&s=4ed6088ee8a67c2d03d86a0c22e0b33e&i=465A488A3A52851⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbabd99758,0x7ffbabd99768,0x7ffbabd997782⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1460 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:22⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4728 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1768,i,10724762759442874846,8491807457597321454,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
984B
MD534ac0ed8a84b411542b1166e5d8b016a
SHA1919e10d13c14e1b854ef773f85a573bff9f46fc2
SHA256e10543915beb1c32fdb7177afaa3df60c6904477e587a1b3bd6a9917692daff0
SHA5124d69754827c54c0a92ee2ab03319a9d76561e4f94357053b975d84fee738dc8404019932a0aca850cc607b9107f623594ee3959db1b3b0f263af5cca562ddb1f
-
Filesize
987B
MD50290a99da45d4b33a4c8f803360acc1f
SHA1fb1d3aca467b209993934d8d4c753cb7a39ed9f7
SHA256feba9cfb3021a13fa22e20456d794c62a134a67b53ed830c492268893ace5b42
SHA512641b43a33b82fa5b02a3e532d6e35e33efcf0059c70b40eb3118df0240e4ec12603c4b59ab6fd82bedaf2be88ea3a7e6be50cb75d8a77fae03e8bd2c3bd642bf
-
Filesize
1KB
MD577aa505056583e1e649a1bc25b595343
SHA1bf4a86e840a09498c88cbfa0c82a06240aa0a64e
SHA25686badc1113fa018f2713df9981f2fd1fe55fe2b9fcdcd035f5f0128800a80c3a
SHA512a0fdea8b1793e7b8e452ca245bd59a391741bcac1524c7f3ec174a9d344aa12d7ceb0369fa8c01896bb6e56bd47fb37ee2b5f65b749a0db3f87932c967dd1148
-
Filesize
5KB
MD50eeb51f08bac7532d1f44f4919383f78
SHA16499834f8dfe28880f3bbce999832634ac1de0b9
SHA25698c40212daec9c0b982d11f9f2f64b418169b422db89cfe61031509c87fae160
SHA51296b15e60669d7211442e93a49f1b0712eddb24da0784fd58ee41332f2634907e89e44afe490c6d29e83f01968491abf924123a2b3ced0a413606b33c1307445c
-
Filesize
5KB
MD55988e889ae0a31f1d0ef259ad594b48c
SHA1de6202a55db5d510a7dd3507e2f0961dfc0656aa
SHA256500217d18da06439b2913b2c3fb2b9bba0c2fd15da5ee312378ec31e32998f1a
SHA51250191621fd2354a18f8879bf86d0b14e1159ae71c20efa360b7d6c4a7ee36b09f90a311cc1a361555e51cbce3592132c4111a691c2587869ebcabdc257af627a
-
Filesize
130KB
MD5e8be359149b8c658eba2650ac71ba831
SHA1326118c40fbba5d44946191e7ed23baf46122443
SHA256f52ed8b44187ff3eaec4206fc8bb72497a708434b0cfb0af3351ba1879348465
SHA512861060410d86871dcbb10fb873e07226c95e60baa5740ba797261b2515478c16fe6376c18f5423d6555db2c74e3da0555a42d7de9da54e0a59207cc90efc7598
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd