Resubmissions
14/05/2024, 15:54
240514-tcahlsdd3w 414/05/2024, 15:52
240514-ta6s2adc6z 414/05/2024, 13:49
240514-q44nzsaa25 1Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 15:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Resource
macos-20240410-en
General
-
Target
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601809724312689" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1768 2220 chrome.exe 83 PID 2220 wrote to memory of 1768 2220 chrome.exe 83 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 2156 2220 chrome.exe 84 PID 2220 wrote to memory of 4976 2220 chrome.exe 85 PID 2220 wrote to memory of 4976 2220 chrome.exe 85 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86 PID 2220 wrote to memory of 2256 2220 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba5d2ab58,0x7ffba5d2ab68,0x7ffba5d2ab782⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:22⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4048 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1912,i,5613308016195682176,1011521814964251091,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5b5ecfdf8531ea619492695e38d25f2ca
SHA12992142557bd19fe6a0f5b825e7f6ce66e42ffe5
SHA25690edb6b80e86708f216ff66f1711a11f27ab79c0bd2080a7f4062f087d1b1a43
SHA5129711f8824fc06f3e19f334717f8a74d3ca8e23b107a2f1e30bf6a64f652cd4904b0f662376453ce5d02042037f6ec736c9b251b6b746926b60135399ca9e5933
-
Filesize
2KB
MD579452b36726d584cce5d668206f45431
SHA126df1c22387563a82f7ffddef83262eaf705e5bd
SHA2562a4ce358a9e1c9c49e5a5d74fa989768575bfdb7f0e773703d13937ff058428e
SHA5125aee1adbfa5192563db883b3dff252338989ea4d0c7912419c4e563c58d261923db97618ac7e86ccc25fa7a8d3047986dabe600714c0b06d2de0d559eeb360b4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5e37e51a5f6e69395f9f53c52c48bddce
SHA19fb6152e1b09697c3cb37b542eacb32b0a2bda43
SHA25618f09fd95352062004711222e2a579a009787e492afe26818f46e35e75dda1ed
SHA512e27db0ef95e0fbf0ebbedb902967bb012472e3249da669fa0f41903269dc5cf464044c105ff56b87eb80694fc38a8cd3e56feda499a970876b94672ff23a0e10
-
Filesize
7KB
MD5ffd271801308ec63da94b4bcdc538d4c
SHA18dbe850170214dff2059499e7e344df923dc7dd4
SHA2561aeea3116b00b6ba046437dfa1197a00445f7afbcd26ce4963e6050c0ab8066c
SHA5128064fe537754bfe0f99ae0fe1ab1c283bf6f5e990c558e2eadfe937135a2138eac9b9c24567c3f1ffe725f7ce86967343995d6a88656864f9ab4e96cf1936fe2
-
Filesize
129KB
MD576783950c91d8c4812d59d7abdd2b372
SHA1a4e2eff01cc104412363666eb31f09fdc296f5a1
SHA2568627a4ca41c0c9101c3700478eb9e684f36db4d482ce404de48908264fb2f61f
SHA5129e7e64d980453522ca280e6ecad9106ba4779009f644e0e4cd502a268c2385b50bfe29ed32669177fe3494889aecf3f11f9d1dd1ea31a6606fe87aa63775a013