Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 18:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.oneclickmailingsolution.com/ga/unsubscribe/2-187131581-20110-25297-46203-f5528bb96fa4ecd-1a013be6b6
Resource
win10v2004-20240412-en
General
-
Target
https://click.oneclickmailingsolution.com/ga/unsubscribe/2-187131581-20110-25297-46203-f5528bb96fa4ecd-1a013be6b6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578530588030378" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2896 2152 chrome.exe 85 PID 2152 wrote to memory of 2896 2152 chrome.exe 85 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2200 2152 chrome.exe 86 PID 2152 wrote to memory of 2112 2152 chrome.exe 87 PID 2152 wrote to memory of 2112 2152 chrome.exe 87 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88 PID 2152 wrote to memory of 2000 2152 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.oneclickmailingsolution.com/ga/unsubscribe/2-187131581-20110-25297-46203-f5528bb96fa4ecd-1a013be6b61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4fd2ab58,0x7ffa4fd2ab68,0x7ffa4fd2ab782⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:22⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4676 --field-trial-handle=1904,i,2873808407843662408,11775764658883623393,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD573c90b8345f9cbecb7e37ddc85139d7d
SHA162d81fbada85cb1ec3f05ad2e72ad9fc86fdde15
SHA256fac466665644e366dc52cb0915bced28a5fa46e1073ad9182abad29cae494562
SHA512555378b4a5382ed82452aad3af66f33529a015ae1790fcb8892238073a4e9159e77746377801fd33d530677bc869a4c096a21937e6498a95ce7f17879199e811
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5540b8ec98ffa13e0a31423513dd2d845
SHA1268bb4e4a8828b72f7ec7ec85e516bfba1c38b5a
SHA256597629936546934cf34d3ce5d0a6a4d39d21aede9adb684fff5671538f90fb33
SHA512ca95383808561c955f35b4ab9d1fde7d8bfbf45e4372a07a7967aed04718d59b77da8bd0bd80a6d8154516cfa0c23d1efa3af3fbae015ad1d04803b4d350c6f9
-
Filesize
7KB
MD5ebd5eb76b6945b94941ddaf9e064751e
SHA1d4e2981d96b928a1a85e8740044a7f67c809186b
SHA2566c73e76a0f4937001af0837f3dfa5e8520487849a871cb4f11a673b697d6ca77
SHA512b518336b2f4c0baeca53c34bd6d146e6e6bf11a107bd757a747a2f2e86cfb9140d406bbbb43f3a964257a028b985b92d33bca049d82f06226166d34e865c786f
-
Filesize
129KB
MD5514537d9268dad46fe307ad56f819d86
SHA17ae87820fce6c986c24ac677f47a2b699abe8541
SHA256966dbd7a3dfbd748f447fa1b76efdaf9acb4a2a5a646df6c652b0d5ddbf257cc
SHA51285346dc6fafac6dfa2def492cc43483757b148526daf78320b6ac3910071fc51d80eb55ff8f1cd6d767260b74ee9e1cee85e07ada09c98153764dc76a333dc0e
-
Filesize
128KB
MD562042d2863802fb9bd53a24438269966
SHA14cc31a5ab432add5e14725e65e7218041bf203e7
SHA25687bdc78cd01a90494b90a2a9a8d7deb8b75c01402bb49a5a065827f595d8e693
SHA51288eacb0e3e89ac0f3e8ad0061ed8148476bf40e944a9d26a68262fa18f89f3e8af90dc44e46de9e3e8e137eaccd127467bd9e2268c89ea00b52cb0cb682c37e6
-
Filesize
149KB
MD57174b46ac3b1feade02bb0566c7eea19
SHA19137c3e70ff2ab0daec681ab0ae64c51536f0990
SHA2565eafc223db8d2c3b367201af1635337a593b3d5a6eb9b4f829f093d4caa53b45
SHA51273c9ae8762d4bbb2585ad03dd2b74f6f3c6ce8a6b68d3d756a49fbaa988b9d6b70e5363cf1dffed00bf55218f07f12d87c3c67f90be611d22e3fc6c9fcb9cfbc
-
Filesize
129KB
MD5d23e8945e31bf4309dad78d297b76025
SHA1e07cde67006e96e8288d63b8e65b71eedf0031b4
SHA256345a49bf4a9ff53bc47276c8d6c71aef714bbb872ec556cae0c333ac6e4ea352
SHA51268e8014272344bb87d5dfd63676e59e1f842ed7060748fa8f0591f68292a8b224a6dae86ba700deeace863fb7fa781eb793a4b5628a8eaecc37951acfe206f4c
-
Filesize
91KB
MD5e734bd819e1f7002b88cf0c0d0ee3c7a
SHA1083a9d679a1c85188f309c0e628255e39a99e4be
SHA256feaaf1af0e86444817941b79a7b71ec53a230f2b50e64e831077dd6c68664eb0
SHA512e4d860f6afb60a3cf7c284fe8007bab9170af5d9d14129f5e4d33b2835be8f130ebc7f41875892066afd68f07d28316285e783d881dd684984ad04fcbd66de78
-
Filesize
88KB
MD5d0fa28c4adf11b2e823c0dd58d4d8219
SHA1526865333ff41d2d31cb749807f779350c7c952e
SHA2569e0a205e7761085c2084d4f4b816e0b2d6100d455997595664b89109b44264bb
SHA5129e90f4be62db2edad385eeb50447308fcbbd4af4ef52b4bb00a0e315c2f8667beae1d0b9d6dad9a4da04135069b1c95f64d3ca05274915106e25083fc18e33f9