Analysis
-
max time kernel
37s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.digimarcon.com/tracking/click?d=d1MfTurTSAfdFyjPO1F-wh3PS7_h9gEh0DdStDHAWFuj7NEEnz8oCIWpYHnUJ1tndLOs1-bxdaI7tpddjPe3BNHCWKeCpnbVsU29cPmfyItiQ8-ghxxcme644ENVxFDUlPiNMTyfgNb5xntrWrvfzjo1
Resource
win10v2004-20240508-en
General
-
Target
http://email.digimarcon.com/tracking/click?d=d1MfTurTSAfdFyjPO1F-wh3PS7_h9gEh0DdStDHAWFuj7NEEnz8oCIWpYHnUJ1tndLOs1-bxdaI7tpddjPe3BNHCWKeCpnbVsU29cPmfyItiQ8-ghxxcme644ENVxFDUlPiNMTyfgNb5xntrWrvfzjo1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608980718245059" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2840 chrome.exe 2840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2840 wrote to memory of 4188 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 4188 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1960 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1168 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 1168 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe PID 2840 wrote to memory of 2296 2840 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://email.digimarcon.com/tracking/click?d=d1MfTurTSAfdFyjPO1F-wh3PS7_h9gEh0DdStDHAWFuj7NEEnz8oCIWpYHnUJ1tndLOs1-bxdaI7tpddjPe3BNHCWKeCpnbVsU29cPmfyItiQ8-ghxxcme644ENVxFDUlPiNMTyfgNb5xntrWrvfzjo11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e2ab58,0x7fff76e2ab68,0x7fff76e2ab782⤵PID:4188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:22⤵PID:1960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:82⤵PID:1168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:82⤵PID:2296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:12⤵PID:544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:12⤵PID:1468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3940 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:12⤵PID:860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:82⤵PID:4528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3236 --field-trial-handle=1888,i,3534651634281924653,5706739540694746363,131072 /prefetch:82⤵PID:3252
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56a688a2cfe6268a217de728770cefee4
SHA1d1f50e609174c22cf703e41a45dc0534847147bd
SHA2566ea670ef18b1a082b653c9997db93ebe6640c36a8a6874179019ee1826cdf7d4
SHA5125e768b4f561db4d23539fbbdf2b1d91a930a2639102795151043d855879c6d51dee982f80e272c049ef06ef80165294f469260f2df8d1d2619a3d27ce885d158
-
Filesize
1KB
MD5ef18b28a59e703c6db105afa5ea22fdb
SHA166773e25a855fb4c26efc3ecfbc55b4631a84c5f
SHA256a1f5d1870982fd42f2b0b7b9678e864b919e5fd3c6c88fb314aed4a16a3be133
SHA5123664129ecccd362a43d3a6aabbc81a17d2f2382607dcff85e9ddb47deec3520eff183d0869583c9cbfb29d1631344040614d0081f6d4e12d914490a9224a6f71
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5917409a1d817d35f2166aa3e51d9fd7e
SHA1f64869c0c573c314ce117f5a2c4421acaf80cc0f
SHA256a46d7d34f0a247a96a3688d4141ad242ff057acfc443fac74c9e6fcb6450b066
SHA51225309f109b2aac5724f5e8e1806304920fa6823816b3030fed4d70078445cfdb32079a3a09653ba5d2d3e08ebc783907cb1ff6a10963a45c76edd34c6d87a50f
-
Filesize
2KB
MD5a2081f6025b7885a3567bca67d40a0ca
SHA1e5f044bd8c117ff6742ed115084fee9a6414447d
SHA256a61242fe2b22a4a776094200f67b84718ffbab175fc00f8a6616dcdf45f5630b
SHA5126874ec4a3d722bca5d5704ea76c4ec0f76eddc453de95c91e82ec3c3e5de4e4de1f2773cd788aacaaad3590803b09dbb769b7612d92af29d4c10a3033779557d
-
Filesize
6KB
MD5325fa68dce2a518a04c9f2d000530187
SHA122d632e64a637eb3cefa63197f7a6a426aeb910e
SHA25683026ed675a0044dbd0a5124f38ec10c2c7620b45ab773ac5a801e587089b46b
SHA51228eaf5b4b6ab0fa9b7c9da2d611fb3e3fc175c61300cb69ed60906b062c1f8d0435e3fde82891075250397086c2f11db4361cf8e44bd3a92fa91d740a7e896e0
-
Filesize
255KB
MD543da15ac6730a04a35c0045d364f14a2
SHA183347f5343e6f03ba17b8891edf00385e79c993e
SHA256dd4863d5b543f2948b4c1ca32a64ef7efe01fb428a5437009f5de12b5aaecfab
SHA512b1ce285367be7a0513f1d897b8813d9942db9f6eee34cfc9540d0886f75b4b2fd7a0e6e6c8c7a5048a76255a6cb89b3216d0784ef03d77fa66b3dd0d0af07111
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e