Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url2.mailanyone.net/scanner?m=1qUpfg-0008ey-4d&d=4%7Cmail%2F90%2F16
Resource
win10v2004-20240508-en
General
-
Target
https://url2.mailanyone.net/scanner?m=1qUpfg-0008ey-4d&d=4%7Cmail%2F90%2F16
Malware Config
Signatures
-
Legitimate website abused for phishing 1 TTPs 3 IoCs
flow ioc 4 url2.mailanyone.net 8 url2.mailanyone.net 9 url2.mailanyone.net -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613946852398851" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4116 chrome.exe 4116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4980 4008 chrome.exe 81 PID 4008 wrote to memory of 4980 4008 chrome.exe 81 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 4780 4008 chrome.exe 82 PID 4008 wrote to memory of 1120 4008 chrome.exe 83 PID 4008 wrote to memory of 1120 4008 chrome.exe 83 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84 PID 4008 wrote to memory of 2564 4008 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url2.mailanyone.net/scanner?m=1qUpfg-0008ey-4d&d=4%7Cmail%2F90%2F161⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe32e4ab58,0x7ffe32e4ab68,0x7ffe32e4ab782⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:22⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4532 --field-trial-handle=1916,i,9166210111501410423,3851075630560864846,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD53bdc8db95b9cade3bc6bd63a8ecc0d23
SHA157b4475b8131f7c236859539e9e59ebfef408ef3
SHA2562d3734cd7220f3a9b91d0911913d066b47c29dfd9d388138ef3ff738a33f7c86
SHA51243e9e4b576dbddc6a7e8a60c423a22b1ab3815a0184c2e86aa19e2ea9cde3d1b8b0ce4853ae8a1e5cb676afef829110d603e4f8ca179bb3f459b4097ae2e8b03
-
Filesize
1KB
MD5bca71a0ce60911377352a083e478ccd9
SHA16bdc10ebb370bbac97ed4e8c4815bd965f52d35e
SHA256ca10c6c163624e8d875c1633a4f2f15741ae50124202e781f45696580c7bdaa8
SHA512b08c7223d1346f887365c18c19357971c83ae28ecdb6f7974fe34a287edfee9a2dfafece2da6ca645842f3e2f8b2d47d0d15b2072b563e267d331b01981421d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5d5053278cff9237b0262e4f2463f3e9b
SHA17c348270b51429858cc96ffe80a5a16fc20c56c6
SHA256d3e6ca9fb13258a3340bd4cd4b79b994b1b0c5f774ae8a0a2fb23822028135a9
SHA51246e51840520217e65c14745e1e44b11c49b8bdf20d55809eff50622b4aaab6e9cf457a7b01a983766e99d8c3a638abb7b0395fcfbe1efe836cfb0d196f196b8a
-
Filesize
257KB
MD57d4d86544bccae9cc9b3f9d6534a1ff6
SHA1708f05f6b3fcc6c8bef2d7e23522d114a821ddc2
SHA2560f536272e7cc4db49b7e5633fc0f83ad37bafb4a088075643e265c5c86830ead
SHA5122888e81ac44bb8d2091dfa5edc577457424641a8f3c8a94bb8fb916200b73e513b1de85d4104e3fc604e011b8355e58267ed9bc4184b17b0a9073d244890db95
-
Filesize
309KB
MD5cc8b3226dcc228c19460d8266d46bae2
SHA17db80f473957c1970aa442bc4cd324b9c695f966
SHA256936e3cfbed7938464b8fd81777c48bef0f784910c5e3c750ff84cedf532f0508
SHA5129fdd3f6349ac350a9378c1fcb3469f604461dad922984b9ab07f19f8e8173ec8d0f79c03feb08f40385414731b12b50f673c32f8722005180d42c6d56d261d4f
-
Filesize
257KB
MD59c3f030391075253eb7b9c519beed291
SHA1b90f76c6d5346b7b8b879b75a085c65d363e9a9e
SHA2564f4dfe311cd475365664a511288296e8c37cdae15759aae4af0049dc11abb8cb
SHA5127a47f68ff8bd43cf3e6df581bf5511d70bfa4bbcc398e0faff15dda3b3a2b039f609c5c6ac59b1896c5a3f3872637aff16fbcbe153595d8dee4c08a78398c7bb
-
Filesize
257KB
MD5d49f5b8ab8269323f26be5fecede6421
SHA182363127ea1d7988b943ff3d56732b851adf191b
SHA2563e9e16a737831adaaebe0891cb8cfcb54af4d68088e363b53fdd9065b36ade63
SHA512cb14ccebeca7da886bd97a6c42fb0805923a966ac76507bfbbdaef9b22934771449e2ed99cb23649ae774737300f1d32ddc1d5b32acfb6625957b342cdffa815
-
Filesize
91KB
MD5d96598e771ac0b3816de788ca54a9b01
SHA104334805b0ab92f85a6adabe5f73b952053f33dc
SHA256bc5b20b2ec9b9b8e7f65ef9706804d7adbbecc2de21b66d27e80cef362706d21
SHA51255b7fdd1aecebcccbb09fe83048b2a075758df626f1fac9af3f9af4f8120a2e47204e29f3b441e2e3b4d07e468dffd8446f0acf655d1e6478caa7aac29a3d08d
-
Filesize
88KB
MD5e97be8aabcdaff2284509ffe4fd8d2f0
SHA1b4a0cf44bb770e78b65800b3d9fc125507c1b86e
SHA256591661c25fc317a088c37e06054955253297e12fe7bc276bfa81bc4a7774c5ad
SHA512707d3928cadb6d99ecd34e0839a59dac39239002fff507aca90d9aae8dab1250602e7ed55cc0e889492da4883959ae7934f6f1f5265043a1b46034dcd7aa0742