Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 20:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tripadvisor.us1.list-manage.com/track/click?u=16966ef3c784132e816333f7a&id=bc40cf6201&e=39a7df3383
Resource
win10v2004-20240426-en
General
-
Target
https://tripadvisor.us1.list-manage.com/track/click?u=16966ef3c784132e816333f7a&id=bc40cf6201&e=39a7df3383
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620083726752060" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 316 chrome.exe 316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 3476 316 chrome.exe 82 PID 316 wrote to memory of 3476 316 chrome.exe 82 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 5076 316 chrome.exe 83 PID 316 wrote to memory of 3572 316 chrome.exe 84 PID 316 wrote to memory of 3572 316 chrome.exe 84 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85 PID 316 wrote to memory of 1228 316 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tripadvisor.us1.list-manage.com/track/click?u=16966ef3c784132e816333f7a&id=bc40cf6201&e=39a7df33831⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff053ab58,0x7ffff053ab68,0x7ffff053ab782⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:22⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4164 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4740 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4160 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5064 --field-trial-handle=1916,i,5220441674874465818,10011918272426713572,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5acec626b5c6c9ffc599a9d7d90263c69
SHA1af48b1ccba947f3d09b06fe792052eacf8cc2949
SHA256948b0ed8e78207430b79e01a1507d89bee2643b0838ecf9e57e4888ba1bd5e8a
SHA5128311ff3354abf9a3ebd2e6724e114042a2bf1cfef1e796eb1d006e4ac686df9160c41153206d2ca5276fe4a7aa708bf85c8e4a827cba8298866db9b4013e46c6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD53a56e42917c4bd022be5e9153f1f3177
SHA10a333fccc2b0dbc6df70999e6d92c65e4ddefb29
SHA256637cdc29a96dd9c2715f75507dabda788c6088e067f9cb05e5eea9dc1dd9a301
SHA5126366d008eb362e0a2c2b852ffcde8750ac83e0f790690d34b3ad58178b0be3313afca1d88bdffc1ef7a8b35739a8a97f733d796fdc6b0943607af288117285ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f90a4a61-acec-4369-99bf-c03b8c6b69d2.tmp
Filesize6KB
MD5e32919d156b302a5000997c2f1b842bc
SHA1d171c711cfd742fa0bb1109edec05bfe2307cae2
SHA256c7bd660986f3f8db3e4f23e903b71dc372fa92084336cc06c8fd079389b1e4dc
SHA512d235e9a5b48e5bc40e051eb087b8c39991ec147612e42906ba320f0f9487900b6a28525eff2d939ba4f336632dabd29c3962689197e49d5ea618782ef85e1c6f
-
Filesize
130KB
MD5d3ff20f150e6821a83128e437859187a
SHA169c971775111dbb307ca7a58c65d9cfbc9220bf4
SHA25679e1642451e9b83d8668519b249c59ba6f3fa1d6aec81b7b10745d0f6eb9ea71
SHA512d664493126f449610de96168321cf1d13017a6b2e70622f5b23561a4054b270d7a00e7760a5c3873d70ed2447c2567a0192256582e5cb92b0474643ab4216f7c