Analysis
-
max time kernel
24s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.digimarcon.com/tracking/click?d=ab2R5GIPR4RnMi36N0yL-nswwqcJjxDShv96udVMt6C2MHc7kgU7mSvwVMTc8H5cmO6yzk0WgefYmqCQz_5TpYnXNS0PEjJB5NnJlYP4WXNh-U1hzeKBDu2NzBHfQ6Mp-ODDvATFAjhyfBecqtEJMWQ1
Resource
win10v2004-20240426-en
General
-
Target
http://email.digimarcon.com/tracking/click?d=ab2R5GIPR4RnMi36N0yL-nswwqcJjxDShv96udVMt6C2MHc7kgU7mSvwVMTc8H5cmO6yzk0WgefYmqCQz_5TpYnXNS0PEjJB5NnJlYP4WXNh-U1hzeKBDu2NzBHfQ6Mp-ODDvATFAjhyfBecqtEJMWQ1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608982651170985" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3728 chrome.exe 3728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3728 wrote to memory of 5312 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5312 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 2508 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5224 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5224 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe PID 3728 wrote to memory of 5728 3728 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://email.digimarcon.com/tracking/click?d=ab2R5GIPR4RnMi36N0yL-nswwqcJjxDShv96udVMt6C2MHc7kgU7mSvwVMTc8H5cmO6yzk0WgefYmqCQz_5TpYnXNS0PEjJB5NnJlYP4WXNh-U1hzeKBDu2NzBHfQ6Mp-ODDvATFAjhyfBecqtEJMWQ11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4271ab58,0x7fff4271ab68,0x7fff4271ab782⤵PID:5312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:22⤵PID:2508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:82⤵PID:5224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:82⤵PID:5728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:12⤵PID:3828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:12⤵PID:1700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4276 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:12⤵PID:452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:82⤵PID:5840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:82⤵PID:5536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4636 --field-trial-handle=1940,i,11047319545971157653,15905114007612998348,131072 /prefetch:12⤵PID:1176
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD55882dcbee4183d4e4de60f08860c0e39
SHA14b4edf8b30ce5996b3d8f11951e324850ed43698
SHA256e203ca7d6f8cc9f7436cc3f7f99834c3e8c86a7196efa07f6b689b037a2e9837
SHA512c5482f14277d76e9c1b2a3f573cdc1950b4a2480948ec0974744874e417bcb936e666b4e1214b259641472e147cdb945fe4f88eb3af84131cb724a367972538a
-
Filesize
2KB
MD5598fdc3b256f86f493c70c32c327d647
SHA111e903ace4a92d7cc329376de17142f8e251fccf
SHA256fedbedd95d74436c860e9376122421d5536b331350ebfdc52e36aecf24635fda
SHA512df28a62b6799c3030ae8fc60d8530c04b87717033384fe2eaffc4ee9633315637941b2f9e6a64d4db56b32316bde90a3d1af2ad11168f7432c1741e7b73dd4a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fbd47043-5ae0-4492-87ff-4df5fc876ac1.tmp
Filesize1KB
MD5d3ae065f555468683c1444562c0298df
SHA10c18f2880cbb612be9a5d6ad343f617c41133107
SHA2562b47a5d744a6c42eb6b3493ee188f6f469783b6b03265b7b3012ce73a9b3be7e
SHA5129792ee3a13bc364eb7fe2220107e2297b44e950f6435bf90a1b7511c931b4cfd1ef5da5c1b36cf4ea9cada144d35622e99b938257be2c79f39f0a10bc554f236
-
Filesize
7KB
MD504be3afa83afcc526604f76f4a119560
SHA193e29798562943e0dcf88d6e8e3b161e21a81354
SHA25695b68820aa70d2851139dffba28ceec81db6529716e30c53ce57aabad240647c
SHA512f245dda19c92fe421044d4ff0a325fd6bd008dea7f327bd2fb5ffe7b1756a53e8288796b88288c9554149017e821ecc56c62551b7f4752f75ad502e28f4c5ab7
-
Filesize
7KB
MD59bb6b1827b92eaa6ac5416af022e3652
SHA10317359003d6e55512629359c41fd27c32db88c4
SHA2560485b70449125f3af02d7252f0a673432839378a2a3a3ae930d00056f48ac956
SHA5126f8124b07ad8b132f0e4412222cc9adb5dc7f646e1c500ad5f931352551a2aa3c388953e05af6e71c60f46dd2b7ca3db0aefffbb08ffd0a5084f8bcc7ecf5228
-
Filesize
131KB
MD5db7439c8559dabc84dd9e3f0a22e4c3c
SHA123e5cdabed055b9c7ba837a7691c2f0fe05468f7
SHA256014ace76ee05ecd1bb9fbfc5629152231ef747d569a3880bf59cd6254a131897
SHA512191918fd98960df7b8b95a95adec2d50614121cd55f3f662db885d78ce1467921efd3e104be4728031d5e3a17abb9732b03d6df52eb904ed84486d3b0606b5bf
-
Filesize
132KB
MD53771bd079faa855384b9bb9d2af1941f
SHA18b2a653fff14a82d1e6f976a4bb677155d274c79
SHA256ad14f3ee74a354c1ea5417f86e2e3c760585cff48a39c457d3fc4ef864d8d34a
SHA512a603beaee54f9d2506b3bd699190683d705fb548fa38ab833e0e395a2320c8e30d7fd34d9e0c766239b7098d1904b83bffef84eab03ec0b349d03a6f621186b7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e