Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 05:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.onlinepromotionsusa.com/?Flow=69AE368E-B0B0-61CD-DEE3-D9572063815B343CAC59&isPrePop=true&RBC=1&reward=cashapp750&o=211499&affsecid=4835840090&subaff1=356632&subaff2=207468&subaff3=229939&aff_pixel=Cdb57a032fe436&subaff4=cashapp750-default-14816&DVID=&subsrc=356632&sid2=356632&aff_sub2=356632&source=356632
Resource
win10v2004-20240508-en
General
-
Target
https://www.onlinepromotionsusa.com/?Flow=69AE368E-B0B0-61CD-DEE3-D9572063815B343CAC59&isPrePop=true&RBC=1&reward=cashapp750&o=211499&affsecid=4835840090&subaff1=356632&subaff2=207468&subaff3=229939&aff_pixel=Cdb57a032fe436&subaff4=cashapp750-default-14816&DVID=&subsrc=356632&sid2=356632&aff_sub2=356632&source=356632
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606585293876690" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3308 1216 chrome.exe 83 PID 1216 wrote to memory of 3308 1216 chrome.exe 83 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4708 1216 chrome.exe 84 PID 1216 wrote to memory of 4060 1216 chrome.exe 85 PID 1216 wrote to memory of 4060 1216 chrome.exe 85 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86 PID 1216 wrote to memory of 3832 1216 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.onlinepromotionsusa.com/?Flow=69AE368E-B0B0-61CD-DEE3-D9572063815B343CAC59&isPrePop=true&RBC=1&reward=cashapp750&o=211499&affsecid=4835840090&subaff1=356632&subaff2=207468&subaff3=229939&aff_pixel=Cdb57a032fe436&subaff4=cashapp750-default-14816&DVID=&subsrc=356632&sid2=356632&aff_sub2=356632&source=3566321⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8be90ab58,0x7ff8be90ab68,0x7ff8be90ab782⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:22⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 --field-trial-handle=1900,i,4533711918312165590,18015642632056955315,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5b68d49144fc7def4e21520ea5f96517c
SHA14720c9092669c4c4f4b95076883e42b64d44be17
SHA256284c200871eea34025629325d6f8681c1d0f7f9fa0e52bf593305e967ebe294a
SHA5126baeac1eb7f8765852f9e54892bbd0ee2dd964cc7b27b800b9a8426e2d56a7ee3c6760717cfbc8d12a89b082cf41df1de8ee65830fb5b5bb994e9868f26eafc9
-
Filesize
1KB
MD532f7ba896323fda09608f27f65cc01c5
SHA1de678c5581b2a28ff1513afb29ad6c1d87ab4d79
SHA256b7510acc8181250ed4967b9fbec51d23ed4847a325a42dd1ece5bc65eb4e1463
SHA5123d3cace31f44727ca0b0e83bbfaa653fbc0cea2bfe7fe47ce796d73da115341fc23cf5b1d6e7be93df39084355b5db31780cf5df8a2db66b80e85040007f5137
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5a168248563dbaf8b460b2f8ee6d870bc
SHA1c374bbeac6da71e1fe14e32691f61f29c205c045
SHA256c40c6a666b6264b42845bb8a51bd8b9e086773e7554bd729342fc4cd763f231b
SHA5120245c93c2199fada033ffd963a32cbd513b1b696fc6f763fa95fd53e71d3f7519c30e21b01d3ec582cdb32a0b8f1da1a299fc66ccc0b55dfa608ebef0064c817
-
Filesize
129KB
MD5827c592cc34aaafedb8a4c372faee1df
SHA1f069d9264bd82d057ef6b0efc129dd6a40e2ebb0
SHA2560fec8bd54ba11383af765bae6c7335033263b0ca9f3c5f1d6cbfc0dcae445d9a
SHA51243dbebd236677d070bbcd15d0a70226d3839a2179fe057cda13a7478b4386050c2e46f3bd22c490421e912dfbcb23b9f4e42b7db89e248ebd8c614e51b4ec662