Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 09:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://click.linksynergy.com
Resource
win10v2004-20240226-en
General
-
Target
http://click.linksynergy.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133623141983849574" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1152 4964 chrome.exe 89 PID 4964 wrote to memory of 1152 4964 chrome.exe 89 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 4004 4964 chrome.exe 91 PID 4964 wrote to memory of 3112 4964 chrome.exe 92 PID 4964 wrote to memory of 3112 4964 chrome.exe 92 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93 PID 4964 wrote to memory of 4348 4964 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://click.linksynergy.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b3029758,0x7ff8b3029768,0x7ff8b30297782⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:22⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4624 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:12⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 --field-trial-handle=1856,i,15492685922321226431,7010206983850767809,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1332 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD594319a5b61d9c314bfd658ee80ebc695
SHA190dbe24c645b788f1d8ca3dd8e047f79bbbd9bc1
SHA256bd9fbb2bc77f099ad4c6cf6e7d8fd674454ecd92da4f224f173fac4cfcc90169
SHA51237c4359436f21dbbc64f278aad8720d039a81a4a1e3b0e05f0b16d1aac06fb299f1465d27b58cc459327bcba61a028b3f6b94f650901669cf9c95bf6b63d421d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6a942fbf-5f14-40a0-bcd4-ad18e516a98e.tmp
Filesize986B
MD5a5ec22c5e52462398fe1df4ac073c7a3
SHA1a1a47f9fa84a5b349f9a0b9dfbe7379c552157f4
SHA2563b6360027521057562ec5e4303973aad8648b65dc9ef4132535bd56336de4087
SHA51273e9ca1e748d6113d97af7c7c057935b8d3fdf971948d594524fba1eaa7e1a5c9d2601da73d939a2311b5087354b18f45d3d04a68a519aab32825dcaeec61ee8
-
Filesize
986B
MD5c34cb8457767f9a740cb747fc82b8613
SHA1570fa833f7db8920a0333a6e97df13999d94f9ea
SHA256272b47253d1197ace4d82be68900de7cb308186db888aa3fb07ffd474a5e3fb3
SHA512c7bc941e9a1f465a2ef7d443bfff9c4857b05befc519a466bea0263c3e7ac906c7f5b9adac62d5685fb32dfad1c11c40e1664ea3c904f60fff23daac0e78536f
-
Filesize
2KB
MD55e8ef3a4c3ae7201d8078764da07954e
SHA100ec52ab375a76e18ab41f8efddc942543965b56
SHA2563288ca16bb5061e8b00159e1f4ef8a19630565f2f616577096fba265533cff6c
SHA5129a9a7d7c3ac1ae1f782fe5cd9506eeb43faf35f8ead4ce5254cb5e1b57463ca656a160d60f724accf45130fdbadbe09316ac8c4bee9162e3eb42f8337730fe95
-
Filesize
703B
MD59ec4d735014a9ce98a6a9012c49d8bef
SHA155e94c6d212f3e027c63f36c3a9f48b5a3e46296
SHA256dbb80e50c7112e99d05604873e628abef8efbad0dd338a9282a9de5dd96ee491
SHA51251d32bb24b95e8e7ffcf00adce39f36b1f43f1a32cb2c1f308eff4fc0abc89e262519391748fb6b56cff1001a1d255b66aec74f18e8510c10a40bc804342320c
-
Filesize
6KB
MD59d91b8d9a2528485151216e4fcc982b2
SHA1a5f378f72dfc5ab99eb6f396a67785d2a6dfa957
SHA2568f60898c7c2c2b04c21fceef406b7acd6c9f4bac99c907f3be940de866eb8309
SHA51299ffc34fd40c7349fbb3852ba5acfc84be8b5b629425c3eea1e8408b0b40cd9dc1fb43b093d84944c67726d162e4ffd7ef3a07eff212e3ae9efb348e10bcc7d7
-
Filesize
6KB
MD56dfb72f234bc09eb9fbfeeb2504d2ba9
SHA1adb8d769a2d137674c2946f6d586e8fb9a1631db
SHA2561e154b1075c421a936248aadacd3234a6d7039836f003d2e72496063e76a4173
SHA51278f95049d1e307e4adcb4433d64055f3d84028207d5479a3e619a66b6abb5700aa477f7bb9e9a0fa57eae2e9d82724c6a6716866e00cdc7566952fcb7951c81e
-
Filesize
6KB
MD511dd05b9a5693acbf6321f2f7438d0f0
SHA138b7a27314c786af81cd9f1a333f8abc67f0cde7
SHA256d1ca3ef4dadcd7a703500d8ca968612be4ddd3005357eecea99a75bbd0bb2a58
SHA5120820839686f5a20177d0bb8bf91c331fc013c9f1617ed181b8503a6c0b3245edd0ed495edaa65c24843df14a63697b5b9d0484568b9b607128743dbc8b060d73
-
Filesize
128KB
MD5b44f17f63c7396c15bbd13bb54122030
SHA11ace24bddbe06f465faf344785aea70b725fb597
SHA256912726983a6e400b798de3906d850f02f612e708da58226d817eb3eb383a6899
SHA5124ed03c8b9b37b2df3ec165dee88f59bd7c374eb4d3ab0ced9e5ce01b3fbbca89453036715ccd2144056d6e272b2155bb31ed9c5ae2206f486d1634c916bbc833
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd