Analysis
-
max time kernel
59s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-04-2024 14:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u23363585.ct.sendgrid.net/wf/open?upn=u001.VXdcGit-2F-2FW33GXYXTPIcW7QxYAfpRQitgAdiZEpATvghu-2BuE-2Fl-2FUiCbbmDGD7duHe6HiuZHsM3YNqnFJhktt0mq-2B3NkdaARIQnlH7zOE-2FYGc-2BUBTQV3-2Fq12SCXe6csbrw39sy9c-2FG5neRCFj13IVUqDiHLm9s9YWB8hM4BKrTEPqy42mf1i0YIxsaBQ1CP9CTXe3BcmYfFbTF5NOuA3-2BlX4WqffQeQo1pP7rLbWWTiHsSDhvDw4jcznQ2uDpbuykAiPJji6XdHDqdrzrG-2BpiU6RDsJyeP2v2-2BqrhFbk2Z0xONn-2FN08OypZdkPXUpe5vGha3m5CSi3LSGNZVmvAPvfg-3D-3D
Resource
win10-20240404-en
General
-
Target
https://u23363585.ct.sendgrid.net/wf/open?upn=u001.VXdcGit-2F-2FW33GXYXTPIcW7QxYAfpRQitgAdiZEpATvghu-2BuE-2Fl-2FUiCbbmDGD7duHe6HiuZHsM3YNqnFJhktt0mq-2B3NkdaARIQnlH7zOE-2FYGc-2BUBTQV3-2Fq12SCXe6csbrw39sy9c-2FG5neRCFj13IVUqDiHLm9s9YWB8hM4BKrTEPqy42mf1i0YIxsaBQ1CP9CTXe3BcmYfFbTF5NOuA3-2BlX4WqffQeQo1pP7rLbWWTiHsSDhvDw4jcznQ2uDpbuykAiPJji6XdHDqdrzrG-2BpiU6RDsJyeP2v2-2BqrhFbk2Z0xONn-2FN08OypZdkPXUpe5vGha3m5CSi3LSGNZVmvAPvfg-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576661986492179" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 chrome.exe 2576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2576 chrome.exe 2576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeCreatePagefilePrivilege 2576 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2916 2576 chrome.exe 73 PID 2576 wrote to memory of 2916 2576 chrome.exe 73 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4532 2576 chrome.exe 75 PID 2576 wrote to memory of 4132 2576 chrome.exe 76 PID 2576 wrote to memory of 4132 2576 chrome.exe 76 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77 PID 2576 wrote to memory of 1056 2576 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u23363585.ct.sendgrid.net/wf/open?upn=u001.VXdcGit-2F-2FW33GXYXTPIcW7QxYAfpRQitgAdiZEpATvghu-2BuE-2Fl-2FUiCbbmDGD7duHe6HiuZHsM3YNqnFJhktt0mq-2B3NkdaARIQnlH7zOE-2FYGc-2BUBTQV3-2Fq12SCXe6csbrw39sy9c-2FG5neRCFj13IVUqDiHLm9s9YWB8hM4BKrTEPqy42mf1i0YIxsaBQ1CP9CTXe3BcmYfFbTF5NOuA3-2BlX4WqffQeQo1pP7rLbWWTiHsSDhvDw4jcznQ2uDpbuykAiPJji6XdHDqdrzrG-2BpiU6RDsJyeP2v2-2BqrhFbk2Z0xONn-2FN08OypZdkPXUpe5vGha3m5CSi3LSGNZVmvAPvfg-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff8e3f9758,0x7fff8e3f9768,0x7fff8e3f97782⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=244 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1680 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:12⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:82⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1860,i,11393070705077477634,17723429218373778082,131072 /prefetch:82⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a5e78a89144c764a01ae3a781a46550d
SHA16dcae8fd43a1513ebdfe7ec919c6bf9378717725
SHA256749ce9758c3d0cd73ad4e3363fa254ed71f9820fd4c8cff9d53749a687fffabd
SHA512b1b5bdeddf226ca05402861b394303ff3c4e6bcd85ea4fcf1242ec520121100c4392d33e1d95b8cfee1edb7612b0defe9ba0185c591c1fed8c6d9ab7706393ec
-
Filesize
5KB
MD58c05c5e79015187d7fbc56cedaf90043
SHA1088076b239d7ca1defb68f4e5bdbb68d63083b94
SHA256e0ba1b2f602d526b2ddccb452fef678300af24c01fadbd8335c12e12ecfeeee4
SHA512c2ff3c8b89590cc36c9e4c9f78010679924b2f82e8e8b511059d65b8123021838f17eac24c9ad279c8beb444fd69e43937227f8bc302071836b23415d0301524
-
Filesize
136KB
MD5d0416b680b1541dd7056640f35095019
SHA1d8e3e7287c8365875a74bf2d9df7ad67ef257d79
SHA2569c3ea869ba1d8c38916a44dd1fdc4a1694f14206c47616b65151fc2928fc3ba2
SHA512e02fe394bd82c842f71c1ec3814c0eeb4befacff3659abd15bb71ec1aab8d91453bc5717b0a26c8e31cae19ef9558d4056ced6d9b96515a24416aa8d64bb3e23
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd