Analysis
-
max time kernel
59s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 00:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://connect.2aom.us/wcm/linktrack.aspx?adminId=31C5ED81F145D518&subscriberID=0A43DD8AB3192566543A8CD9A6E07234&newsletterID=E621600B1D2EDAAA&campaignID=55EAA0050B2C6B7F&bulkID=679168C843E152A0AC412713581F94C3&listID=68F5AE98D1027DDC&openRate=736CF125D99EB7BE&url=https://completemarkets.com/company/programbrokerage/wind-and-hail-deductible-buy-down-insurance/
Resource
win10-20240404-en
General
-
Target
https://connect.2aom.us/wcm/linktrack.aspx?adminId=31C5ED81F145D518&subscriberID=0A43DD8AB3192566543A8CD9A6E07234&newsletterID=E621600B1D2EDAAA&campaignID=55EAA0050B2C6B7F&bulkID=679168C843E152A0AC412713581F94C3&listID=68F5AE98D1027DDC&openRate=736CF125D99EB7BE&url=https://completemarkets.com/company/programbrokerage/wind-and-hail-deductible-buy-down-insurance/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608974034730589" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3936 chrome.exe 3936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe Token: SeShutdownPrivilege 3936 chrome.exe Token: SeCreatePagefilePrivilege 3936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe 3936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3936 wrote to memory of 2764 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 2764 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 192 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 5008 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 5008 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe PID 3936 wrote to memory of 4476 3936 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://connect.2aom.us/wcm/linktrack.aspx?adminId=31C5ED81F145D518&subscriberID=0A43DD8AB3192566543A8CD9A6E07234&newsletterID=E621600B1D2EDAAA&campaignID=55EAA0050B2C6B7F&bulkID=679168C843E152A0AC412713581F94C3&listID=68F5AE98D1027DDC&openRate=736CF125D99EB7BE&url=https://completemarkets.com/company/programbrokerage/wind-and-hail-deductible-buy-down-insurance/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffb75dc9758,0x7ffb75dc9768,0x7ffb75dc97782⤵PID:2764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:22⤵PID:192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:82⤵PID:5008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:82⤵PID:4476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:5096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:4184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:1336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:2812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3212 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:2724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:82⤵PID:2760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:82⤵PID:1712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5276 --field-trial-handle=1816,i,8307437520029332019,423482682088629829,131072 /prefetch:12⤵PID:4212
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562c926e86dc91cb5deca3da178d2d0a2
SHA15cf4ff6557440b48e6c258007794c559c9c0d7e1
SHA2569e683ecf1a9bc5998eca2b2d776b22c0e3b625a8791e4ea7554a684eb5e9a5ba
SHA512ea3a7d0912732e1064cf7de2a160c92b40a9bf1e8ddb6b25d570e81abf6d62cbfe7dd78f0a2e322a1aa5806c4f59f80f31bca449feb3bbb2f8ac0de393954b13
-
Filesize
864B
MD538603961d54ecfbd696a65f94378f2af
SHA1795db72a39e9360358b25f0e19fe846fabedb997
SHA256aadf163ffafe0951a30e767bf0ba13c173b819474d91d24a75ffbbbeb447f8e5
SHA51236fe497531e8d9deef6301f8c4574fdb7756c40edc3b9110db6497a30a5144f62d77b52214790489cbbd4009e44e18f5713c492979aae13612e389f25898f698
-
Filesize
6KB
MD5de66dab7429fff85b0f402827637ef51
SHA19063fd131993e6a6810dd62ddf6dec179bc7584c
SHA25652ddbdc5814a4b6554a450cce1d44c376d86c768cbe4f910e1eb19cc5e913bb1
SHA512e68c545dd727fe1d5bc762f55c62bf7edf3545a1753dbe5335da3a70289f2d6f5b9e5f21351ece8e1c5107c94a4e7fb49e0c38ea780afb63e6e7fb595486d8f9
-
Filesize
6KB
MD53797d0716d40e0ae7870d0df3c27e09b
SHA16d6223fc28da56dd823f8355162e29496ca353e7
SHA256dd0e7ef58f6673d8e22cb6cdb0271d94a5431b7e33997ba503fb6e9822a21477
SHA512538697f3b1fc8dec613ba75d4458868e22ab6ec43692f1b90b3332bd77db3b946b65374a1cfd564094913a29163e5ea7a6efd9bfc6ce40be4ff7d6d7798be35e
-
Filesize
136KB
MD57774149a97702450edb8564af8c1d262
SHA1e33d45c947a4d8ecc4a2b011f5ae1b732d4e677a
SHA256a13f6510476393b2c165932656aa7d1a6ef3858b5ae745f375dbc32c58f17ede
SHA51267248ffb0ab338289fb0632d494a3a6efbc7e6508d9907ff26e1635c5da5affb3ac4ca406d4c7e76d9d72457c147f2a8bd7ebcfeae734d062b1d9cfb358ec02f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e