Analysis
-
max time kernel
323s -
max time network
322s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 14:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url2.mailanyone.net/scanner?m=1s7J6N-0007WG-4r&d=4%7Cmail%2F90%2F1715796600%2F1s7J6N-0007WG-4r%7Cin2j%7C57e1b682%7C17902772%7C12174482%7C6644FADFE6340F2D6246854E6733A1CB&o=%2Fphtw%3A%2Ftts0f-oace3fir-utt5poh6ciecmn.oto&s=w0vGcR0ABPBqDiPDWpXgUs0DA-c
Resource
win10v2004-20240426-en
General
-
Target
https://url2.mailanyone.net/scanner?m=1s7J6N-0007WG-4r&d=4%7Cmail%2F90%2F1715796600%2F1s7J6N-0007WG-4r%7Cin2j%7C57e1b682%7C17902772%7C12174482%7C6644FADFE6340F2D6246854E6733A1CB&o=%2Fphtw%3A%2Ftts0f-oace3fir-utt5poh6ciecmn.oto&s=w0vGcR0ABPBqDiPDWpXgUs0DA-c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603429062727905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 3272 1488 chrome.exe 82 PID 1488 wrote to memory of 3272 1488 chrome.exe 82 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 4540 1488 chrome.exe 83 PID 1488 wrote to memory of 2632 1488 chrome.exe 84 PID 1488 wrote to memory of 2632 1488 chrome.exe 84 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85 PID 1488 wrote to memory of 4960 1488 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url2.mailanyone.net/scanner?m=1s7J6N-0007WG-4r&d=4%7Cmail%2F90%2F1715796600%2F1s7J6N-0007WG-4r%7Cin2j%7C57e1b682%7C17902772%7C12174482%7C6644FADFE6340F2D6246854E6733A1CB&o=%2Fphtw%3A%2Ftts0f-oace3fir-utt5poh6ciecmn.oto&s=w0vGcR0ABPBqDiPDWpXgUs0DA-c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4673ab58,0x7fff4673ab68,0x7fff4673ab782⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:22⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4360 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4604 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4688 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4472 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 --field-trial-handle=1872,i,13046620286773684203,4881395862308593007,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5dc310903c134c36e25c8688963a4f789
SHA19aeff62742d962b501b456baac9b967d704534f8
SHA25642d53509cf11297b5bfd640879a0e2103ac6a37947b47257cd6900bab0bbe623
SHA512ecae7762e56a3d19d456d9eda17ac122bee3db24ef98a2b1f4597034659a4f2396fdd5e4183f4c50d2fe971633aef39b969359ed9f251f9d25c141f11f361cab
-
Filesize
288B
MD5b5c7d7958e74321fa73102bf469fd6b6
SHA19e0aa5fcb44f898ff7898cf742b0c4715f1fc7b6
SHA256a886656a03271a0ac86529f9691b14fa08047fe225421fa3e1f06b20fa15627e
SHA5129c9915371a01c84270724caa684e3380616292e8b7a0578282852b75c67d271fabe82fe463be0e736a6fcce349beb94cc1c33f439a755251c2fb5dcf2bfef004
-
Filesize
264B
MD5686c9d0f596b36867cd2134eff8ba8a6
SHA159a11035c621480d8edd97bcc339a86080fa60d2
SHA256584dcba1bec170c54aac00bc690522bf12e12c734617643b68c20996ef6605da
SHA512b93990dd1fc712f46322696e7338a0e92010014340297241ca9e1a36beee60c2a9ca81eebfc7577d42f4b52524128e1605e51455a36096187285531df42b1d5f
-
Filesize
2KB
MD5700218f445c5b531e7317878f204a552
SHA196f5ccb969e2e4ca306c53cc0f59506a05fd2221
SHA25607b33a599474a343a38cd9321baf1bc58bb64a043189bfee8c7c48fd5888ee8f
SHA5121ecd6c98313290ade22e222e14c0cb784cb818357176956224b68653b4bb1ef46d080c1e6dd90d89be54fd0fbabc5cc800d6e769a40cacdd0c935b79ec0d7022
-
Filesize
2KB
MD5ae528c71146f67a762aa9ad23973b57c
SHA13b97ac0e66715538a7e78eee629be783cc9e60cb
SHA256c66c40a1e6124fb829ed57744578b46359aff8bd91fa058aeb31ea68914afff4
SHA512c757b1f6bb3ea8ec71de7b4f013410edc8fbd56df926de72e8d4c4c3d5f65583fb6b75a65c00c6002c67c22e45a0b513ab0725d3a89a449af6a2872c4e0d0c58
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD533ad3eb1f2fd6960532f7eba9f1ef18e
SHA182f2aa7a7509cc757053e977263de1188d697615
SHA256d3f7707c794ca7bc525169cedc3b694f650e632c8742c49a9234c6b376980112
SHA512d066f4c051c220e2ce5bc9245c52db734cc36004b87a7c8adad548027fac2927d80594fdc573b4cdfaec0f04d148793c1d7eebe2e7dacb0f29bc3ab59627eda3
-
Filesize
130KB
MD58b03e078cd560886c28a1d722480533b
SHA168b01cac6ca653ad201ba6058608e78219eb8df6
SHA2563cd1a30947fa6403ab17edc2f796642743887827750c05e23d8f3b5c273d43b3
SHA51261be8f30fc89526a5277262fefca7e69ead512bafe95b508c3b392b812c89923f03c4c9b43e3be1b4569af618b70ea8ac0ba5386c9208ba1275c2fc5436060e6