Analysis
-
max time kernel
27s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-05-2024 14:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stcblink.nypost.com/click/35184898.131383/aHR0cHM6Ly90Lm55cG9zdC5jb20vMS9lL3I_YXFldD1jbGsmcj0yJmNhPTM1MTg0ODk4JnYwPXJobjIxNjAwJTQwZ21haWwuY29tJnV1PTY1ZWE5MTVlMzExODhkODRhYzA0MTk5NCZydT1odHRwOi8vbnlwb3N0LmNvbS9wcml2YWN5Lz8mdXRtX2NhbXBhaWduPW5ld3NfYWxlcnQmdXRtX3NvdXJjZT1zYWlsdGhydSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jb250ZW50PTIwMjQwNDI3JmxjdGc9NjVlYTkxNWUzMTE4OGQ4NGFjMDQxOTk0/65ea915e31188d84ac041994B23c9fac9
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://stcblink.nypost.com/click/35184898.131383/aHR0cHM6Ly90Lm55cG9zdC5jb20vMS9lL3I_YXFldD1jbGsmcj0yJmNhPTM1MTg0ODk4JnYwPXJobjIxNjAwJTQwZ21haWwuY29tJnV1PTY1ZWE5MTVlMzExODhkODRhYzA0MTk5NCZydT1odHRwOi8vbnlwb3N0LmNvbS9wcml2YWN5Lz8mdXRtX2NhbXBhaWduPW5ld3NfYWxlcnQmdXRtX3NvdXJjZT1zYWlsdGhydSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jb250ZW50PTIwMjQwNDI3JmxjdGc9NjVlYTkxNWUzMTE4OGQ4NGFjMDQxOTk0/65ea915e31188d84ac041994B23c9fac9
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
https://stcblink.nypost.com/click/35184898.131383/aHR0cHM6Ly90Lm55cG9zdC5jb20vMS9lL3I_YXFldD1jbGsmcj0yJmNhPTM1MTg0ODk4JnYwPXJobjIxNjAwJTQwZ21haWwuY29tJnV1PTY1ZWE5MTVlMzExODhkODRhYzA0MTk5NCZydT1odHRwOi8vbnlwb3N0LmNvbS9wcml2YWN5Lz8mdXRtX2NhbXBhaWduPW5ld3NfYWxlcnQmdXRtX3NvdXJjZT1zYWlsdGhydSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jb250ZW50PTIwMjQwNDI3JmxjdGc9NjVlYTkxNWUzMTE4OGQ4NGFjMDQxOTk0/65ea915e31188d84ac041994B23c9fac9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600837636662977" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exepid process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3104 wrote to memory of 4128 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4128 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 2748 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 3824 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 3824 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe PID 3104 wrote to memory of 4636 3104 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://stcblink.nypost.com/click/35184898.131383/aHR0cHM6Ly90Lm55cG9zdC5jb20vMS9lL3I_YXFldD1jbGsmcj0yJmNhPTM1MTg0ODk4JnYwPXJobjIxNjAwJTQwZ21haWwuY29tJnV1PTY1ZWE5MTVlMzExODhkODRhYzA0MTk5NCZydT1odHRwOi8vbnlwb3N0LmNvbS9wcml2YWN5Lz8mdXRtX2NhbXBhaWduPW5ld3NfYWxlcnQmdXRtX3NvdXJjZT1zYWlsdGhydSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jb250ZW50PTIwMjQwNDI3JmxjdGc9NjVlYTkxNWUzMTE4OGQ4NGFjMDQxOTk0/65ea915e31188d84ac041994B23c9fac91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffecc329758,0x7ffecc329768,0x7ffecc3297782⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:22⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4868 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1836,i,13186598255658065579,15185109513567729972,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD568f5ba5d430ad291aaa232472b113abd
SHA1431eb100c82081a830df68360b03d8a8172308fb
SHA256ff00ecedd6a2f77de3ab624d54d87f6169882a18091f17fdf4cda894dafacf00
SHA5122304de810d9809ab44c075e017b0232252a81b2713cd5063af9d6ef2ea18f4f22cda5a9dc58ce3b776f0c36f0352c85b8ea6e345c9e0e7cbe1daa8bb3aaec39e
-
Filesize
1KB
MD579334798a3de8049a8b69322edf10d45
SHA10e2a1142647605bf3b79884dca2e33a7f85ba08f
SHA256c2a99edd6138f3da935593bfe870eaa5f28c4b8297c9e384a9d25f2c353a3a3f
SHA5120621ae2c59446348f05c5d3834ed760d1671c78176bd4f42152e1952e27e223465b89e8dd7c87bae733fc1094279d5cdec910b3a3267542989926712d870e051
-
Filesize
6KB
MD50c95876b677adec3220f983b1c382e3a
SHA105c7d7572777f792c9d532871c82810d53e83c0a
SHA256e9a0de95d5bff2f5f851cc3d00a60743ec6cbff5500d81467ed4e56ff681bed6
SHA512152a707a537c1bb3f633f1f205755b87bda9998097a657b3088459616d76152ababbc8f26f9b95d83c05564386cd235210d255563f87cde40c77ca02aebe897c
-
Filesize
138KB
MD51414b928da122ccb2fc00ea14662ac0c
SHA1682dc885ef6298246381e78758c017027367152e
SHA256576e301ac59aaf324082aad5cbacc399f58519fd8016eefd49c78c0c02d09218
SHA512458d2b484aeb8f8e2a7ccae94d37ba858f8c100266dcf12ea02ae843b1fb1326d35a0f5ccd7fe29f057b4dd704188f16bb47c9c13ce6f827b53f29a051b2cfad
-
Filesize
137KB
MD5479e45118ac4fc52e9272a253f197521
SHA189d2ca16975dd17c4e907b39446f7640232030ee
SHA25677defab363ef6d32bdea5b83e3ec28a4cd4165be6f1489435672fb2209a0d9a9
SHA512f4241beb60a967d82971a6aa04a58504b4e321df9a29fa390c39c068cea92d388d57ab0a76ac4cd155667ac93453dcf009a539fef3e246ff83060f3ed66c66df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e