Analysis
-
max time kernel
82s -
max time network
78s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-05-2024 22:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://holtec.us7.list-manage.com/track/click?u=97609a78e0424083cf3f478b3&id=7ec330419a&e=0a4a1d2e4c
Resource
win11-20240426-en
General
-
Target
https://holtec.us7.list-manage.com/track/click?u=97609a78e0424083cf3f478b3&id=7ec330419a&e=0a4a1d2e4c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602001325580375" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeCreatePagefilePrivilege 2620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2076 2620 chrome.exe 79 PID 2620 wrote to memory of 2076 2620 chrome.exe 79 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 2584 2620 chrome.exe 81 PID 2620 wrote to memory of 4708 2620 chrome.exe 82 PID 2620 wrote to memory of 4708 2620 chrome.exe 82 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83 PID 2620 wrote to memory of 2348 2620 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://holtec.us7.list-manage.com/track/click?u=97609a78e0424083cf3f478b3&id=7ec330419a&e=0a4a1d2e4c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7a0fab58,0x7ffa7a0fab68,0x7ffa7a0fab782⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4256 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:12⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4348 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4552 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3196 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3288 --field-trial-handle=1872,i,4562666732089248946,13219003821164287872,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56e3bc2919b5cc476289858ce5650d4ae
SHA188b3158ca8c50ba1434fe84a5a2457333034ebd8
SHA256a9b5a7bc5f0b65f520e909a7b19b67c8293fec993ac3ce3138abb78e12a8e094
SHA512b8475c11fb7388654f023bfe4107d3abe835b7172e6fa62c9fc6e443480dee4da70c03436a4443bf67ebc5763a8b26ca5ed9fd5e1539bbca3ce5303584e78770
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5583021c631989cdf5815fbcf26e43e23
SHA17a86d71df37d667eb80bf912f2696e0da8b724bb
SHA256588cd96511d3d60875bf4105f44a6b813480a6310c39f9c725549f43215edd73
SHA5125f4619986ad9cfafa464e950dc1df7a825fc8069abd24369ab9e713af9932f43c9609cc3878f52b773bd3e59858a1d0ccd0f663edc0c33e36608024e1d0561fc
-
Filesize
7KB
MD5ed947fe0b71c7e99a8e96ed10cd4abf0
SHA1e82832472f7465fda026f42679b7637e554122f3
SHA256a2432bbca23461d5932ab1e7ea0dd87a676079da267f61298e4cb32e3d99b2d3
SHA51247bcfe0357a9d82096a230b5363051dff986c8ac1e71956830a1d81df1ca4c60387050f707a7d618710964c123d1b3ec43c077ebd3e612c9b5c2edf6662285b1
-
Filesize
130KB
MD5874301982dace3e79ab012dee90a051a
SHA1094991f0f7368b35b2c6b89e72020ae2d9e794d7
SHA25622804776b6a8c25d157d07eb09d43dd4f0575ae4b18ff7aaca07f2e7663b6bd5
SHA51202741100c4b759eb1db298f282803abb05ef3e3744fa09394307bd6c6fb3c32d9bf42545d44ced9c7710beee10e3ffa77e17be6587450f42ad694c87523bfb24