Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 07:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lnodcommunities.us21.list-manage.com/track/click?u=b1e845df925399309f5e4305f&id=55df0d5605&e=662b25c631
Resource
win10v2004-20231215-en
General
-
Target
https://lnodcommunities.us21.list-manage.com/track/click?u=b1e845df925399309f5e4305f&id=55df0d5605&e=662b25c631
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571215162780442" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 2188 3736 chrome.exe 86 PID 3736 wrote to memory of 2188 3736 chrome.exe 86 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 1812 3736 chrome.exe 88 PID 3736 wrote to memory of 4696 3736 chrome.exe 89 PID 3736 wrote to memory of 4696 3736 chrome.exe 89 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90 PID 3736 wrote to memory of 3844 3736 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lnodcommunities.us21.list-manage.com/track/click?u=b1e845df925399309f5e4305f&id=55df0d5605&e=662b25c6311⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbf589758,0x7ffcbf589768,0x7ffcbf5897782⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:22⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3928 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
384B
MD5b6d86b37d9c77e8eac45bc43ff205c06
SHA1655a77d529cb5513b7f76aa95424fd95d5fee08b
SHA256bf1b877025e63879ce4df3e294588687cb7d16aa0186d73ee899434ca5723b31
SHA512cbbc8139946ea2889d25b82ce22d109b816baa7ddd90c41e1e793434b9fc638059934d96bb50ca6bee0e15485fbf19a46f4835387db15c42fce487d426e632cc
-
Filesize
2KB
MD5a1509648952ac6ee850087093ce4c05e
SHA18a89930a3fd51832a41afb04055e224580561afa
SHA256ba241db94f5717f06bc61bf5d6960fc42224becd222802bc9f28905135662bf5
SHA512f1de5b53de31f36ca472607a21f010e0d5027efe8b2540ed54f27d9553a01037523a20cb3036c9a856f31ea6ec21fdec8cd5251d11b508dcbaef1448d39b8f5f
-
Filesize
1KB
MD59df166816aa1e924291ba150d6226386
SHA1c7fda823c02fe23858944b7283abee8e233dd646
SHA256a25d85a7b8e7bb7a3484dec95a7e5b287e81461b0074e57046e30859edbd3c33
SHA512ad0a9d8985023412327c5cbaa0af03e4d4673a02bfa46ecad98d3e247b9eb933c0b255448945ac0ac706445117122916a44fe404361d366c2de3b77f9a054c56
-
Filesize
6KB
MD59b4033c0351efa277b6f7410e4be04d2
SHA189bcd72bb3d8d21be73adb96a04562587d01aa6e
SHA256080cf7ac4861abe93b94e9b4e86831bd2ba7dc09305a064b32d3a03887d936a6
SHA512ddfa43627f7994bf665f9e2f2f375583d5d7336a565cf6f35750a7bd92e6c9a07c849e4c602569f8c51ece56703c7ded19c3e408050af4fd4cea5a1d0baf85b3
-
Filesize
114KB
MD50754d9f2fd6dbb487bcbe7e4538ca633
SHA166f7db7e07ce74f82bf593ac1714e0ced8113180
SHA256b79996b25b740516cd801dad67182bffa9744a3d3a058da8a29995126c5a657a
SHA512a04df65e179e7b65280882f5d3af4078152bf5da54439e4b695b30c688c77a59c9a377c45aa9fdf03aa15b26a96802bb21cadb9b76d8f4686b3dc56321921983