Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 07:31

General

  • Target

    https://lnodcommunities.us21.list-manage.com/track/click?u=b1e845df925399309f5e4305f&id=55df0d5605&e=662b25c631

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lnodcommunities.us21.list-manage.com/track/click?u=b1e845df925399309f5e4305f&id=55df0d5605&e=662b25c631
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbf589758,0x7ffcbf589768,0x7ffcbf589778
      2⤵
        PID:2188
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:2
        2⤵
          PID:1812
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:8
          2⤵
            PID:4696
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:8
            2⤵
              PID:3844
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:1
              2⤵
                PID:3576
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:1
                2⤵
                  PID:5080
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3928 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:1
                  2⤵
                    PID:4424
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:8
                    2⤵
                      PID:3432
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:8
                      2⤵
                        PID:4440
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1884,i,6188616309396135626,12713169276020682163,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2524
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4056

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\81d9ed58-d339-4b1a-8349-382eab2b66f6.tmp

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        384B

                        MD5

                        b6d86b37d9c77e8eac45bc43ff205c06

                        SHA1

                        655a77d529cb5513b7f76aa95424fd95d5fee08b

                        SHA256

                        bf1b877025e63879ce4df3e294588687cb7d16aa0186d73ee899434ca5723b31

                        SHA512

                        cbbc8139946ea2889d25b82ce22d109b816baa7ddd90c41e1e793434b9fc638059934d96bb50ca6bee0e15485fbf19a46f4835387db15c42fce487d426e632cc

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        a1509648952ac6ee850087093ce4c05e

                        SHA1

                        8a89930a3fd51832a41afb04055e224580561afa

                        SHA256

                        ba241db94f5717f06bc61bf5d6960fc42224becd222802bc9f28905135662bf5

                        SHA512

                        f1de5b53de31f36ca472607a21f010e0d5027efe8b2540ed54f27d9553a01037523a20cb3036c9a856f31ea6ec21fdec8cd5251d11b508dcbaef1448d39b8f5f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        9df166816aa1e924291ba150d6226386

                        SHA1

                        c7fda823c02fe23858944b7283abee8e233dd646

                        SHA256

                        a25d85a7b8e7bb7a3484dec95a7e5b287e81461b0074e57046e30859edbd3c33

                        SHA512

                        ad0a9d8985023412327c5cbaa0af03e4d4673a02bfa46ecad98d3e247b9eb933c0b255448945ac0ac706445117122916a44fe404361d366c2de3b77f9a054c56

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        9b4033c0351efa277b6f7410e4be04d2

                        SHA1

                        89bcd72bb3d8d21be73adb96a04562587d01aa6e

                        SHA256

                        080cf7ac4861abe93b94e9b4e86831bd2ba7dc09305a064b32d3a03887d936a6

                        SHA512

                        ddfa43627f7994bf665f9e2f2f375583d5d7336a565cf6f35750a7bd92e6c9a07c849e4c602569f8c51ece56703c7ded19c3e408050af4fd4cea5a1d0baf85b3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        114KB

                        MD5

                        0754d9f2fd6dbb487bcbe7e4538ca633

                        SHA1

                        66f7db7e07ce74f82bf593ac1714e0ced8113180

                        SHA256

                        b79996b25b740516cd801dad67182bffa9744a3d3a058da8a29995126c5a657a

                        SHA512

                        a04df65e179e7b65280882f5d3af4078152bf5da54439e4b695b30c688c77a59c9a377c45aa9fdf03aa15b26a96802bb21cadb9b76d8f4686b3dc56321921983