Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 20:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.link.adidas.com/?qs=ca3bfc1438f03f599a2732371b86783f0203c94454ce0ba54b7da6fd463a5804c2fd0a0763da063f44f747c74ccfa84b83993bfc2a6a7ad5852f253bf3ba04c3
Resource
win10v2004-20240226-en
General
-
Target
https://click.link.adidas.com/?qs=ca3bfc1438f03f599a2732371b86783f0203c94454ce0ba54b7da6fd463a5804c2fd0a0763da063f44f747c74ccfa84b83993bfc2a6a7ad5852f253bf3ba04c3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133570818926429740" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3008 5080 chrome.exe 85 PID 5080 wrote to memory of 3008 5080 chrome.exe 85 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 2380 5080 chrome.exe 87 PID 5080 wrote to memory of 4708 5080 chrome.exe 88 PID 5080 wrote to memory of 4708 5080 chrome.exe 88 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89 PID 5080 wrote to memory of 1672 5080 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.link.adidas.com/?qs=ca3bfc1438f03f599a2732371b86783f0203c94454ce0ba54b7da6fd463a5804c2fd0a0763da063f44f747c74ccfa84b83993bfc2a6a7ad5852f253bf3ba04c31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fef79758,0x7ff9fef79768,0x7ff9fef797782⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3924 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3196 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1068 --field-trial-handle=1864,i,5625772481543640438,7826208067138920793,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5fa49f70af05aa7940c516577f5711a16
SHA17a804502d35df5453f926f5f60bb9a23b75f062e
SHA2564580c5f5a6b02f71eccc687f2e1c9400a82bee64af33f9b5f24f56727d9d9fdc
SHA5124f3106ac3438f94789adcd7664dbee20b395254edb990a4cff0d9cf674df8e5f89226cc28ad5d817c855f2bc4e1d5e4a4c1700f42ea0ae720b3c007df362fe04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\228e8a88-b152-4cc5-8e3d-916182848226.tmp
Filesize835B
MD561e841585a4291071d323e684f44ab43
SHA13986afe1c5ae0eca47a4f174872ddc6986b07eeb
SHA2561f6868fb4e153e6c3c1de020bd710d090b9a091dab8b98003eb6b2345c94cb45
SHA5122b62fec66ca3f47eceaf701a596dd59b28b1b7173dd4689858ecede38cdbfbd77f2d1529b2c080d5851db1df51ab5bd0b5dba5d189e2141e788dd3f3278f3efa
-
Filesize
1KB
MD5e8255fb4016975ae1dad15f7c1971f80
SHA14329cdf0eebff76317dd2f446b2e20a10510184f
SHA2567884cf188228c05ddb15bb193322deaf70b2edbc806d55a48cade8b4e559e677
SHA5127ffd1b7e734fea0d4aca39a61e3be5326e204afed8c82f958fcdac284d9d50cfb552043ff7ab1d4a93950147e92b7c85e237835d1e636bf4aa523c616b3bafa4
-
Filesize
6KB
MD5ee4d973803182f189c6fc7febb355de7
SHA17d954ea616b1fa108319af5e1112e0d51faa9785
SHA256005b660208ee5dfc6c21cfa004c1ee7a93e76aff41b483b674de46e67074d984
SHA512d0a357a551b5112fb9fb2ecb565dec0ebad278d8250b1c34a4f31f38807e28d3595bf4a93e4eccb9e78fb0716eefa395f7df32faf799c5fafebb24b0c4203d79
-
Filesize
253KB
MD5f4b00572c508579aa5e2d0d05058da44
SHA1b8864741cd1e1a7a52a02dea749de8f1a6ff7d19
SHA256ab63d77f3e6df1a4f14fb393722bf77a73bd8f76c628e6d1f7b435bd715c1b72
SHA51210f227bb0e1d1a793d846af83e5703294e7324d496b0dd3097d429c03eff44a052a044486c352675eb80536b7781b7ed762eddf81ce686613ac05c44c429600d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd