Analysis
-
max time kernel
299s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 18:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.pstmrk.it/3s/www.driversnote.com/Mkg4/1fi1AQ/AQ/07c8ef76-1a5f-403f-8fca-7280efa3ecf8/6/QnB0qUzpvb
Resource
win10v2004-20240611-en
General
-
Target
https://click.pstmrk.it/3s/www.driversnote.com/Mkg4/1fi1AQ/AQ/07c8ef76-1a5f-403f-8fca-7280efa3ecf8/6/QnB0qUzpvb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627753680878612" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe Token: SeShutdownPrivilege 4552 chrome.exe Token: SeCreatePagefilePrivilege 4552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3872 4552 chrome.exe 82 PID 4552 wrote to memory of 3872 4552 chrome.exe 82 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 1568 4552 chrome.exe 85 PID 4552 wrote to memory of 4368 4552 chrome.exe 86 PID 4552 wrote to memory of 4368 4552 chrome.exe 86 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87 PID 4552 wrote to memory of 4260 4552 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.pstmrk.it/3s/www.driversnote.com/Mkg4/1fi1AQ/AQ/07c8ef76-1a5f-403f-8fca-7280efa3ecf8/6/QnB0qUzpvb1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0eeab58,0x7ffed0eeab68,0x7ffed0eeab782⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:22⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:82⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2792 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3304 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1884,i,17648242991411599606,10940515847230401084,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD51302f11561ee454e939cff5810be518f
SHA1cbf72645dcabc5f7c65555b5008206de1b964dbb
SHA256aba9262f0f2435afa864fa496d94efff2d9654bb9ae19698fdb56bb79efae58e
SHA5120d68c95d178d5aa82cba3ba4e79bc5f8bdccb8935ae0b136ccfab0d316ae8edff7eb8f28e9b33b8d2e9c0b1b3235acf55c7d191a8a67d85f886933ff37287941
-
Filesize
4KB
MD5370aa3e99c77f3824018330c7e5ad7a2
SHA17a40c5a4280ecc939ab17721e1f5c3ee02204988
SHA2567389da4505f1b9600f0b37b5f044f8e36a20cce4cbb239b53dcbec9b60be0302
SHA51273d6b6feff36110a91cd13eee470f5a9f398e8fcb0e29d9a266acdd1cb910f796091c44c6b34607937d5481a16ad7dfe33f4905439ecdbcda27156508153513d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5e5041a200033bb24c50bdb750870bdc2
SHA1db442085615f1ad3998353b08decdf852e5529c9
SHA2567ed24cadf2f52f8622fbf7ff71c69818a882d8facff950212cc6b6ae6cfa0be6
SHA512679f82fddb42a1f90a140a8f8ea599d4b1600ec2db18431e9d3410f07d86a95afc7c019b2708f180bafb17f2eb04d88d065022dce6b8d873edd8e8700f3dff0f
-
Filesize
7KB
MD5a2bd8aa403e4e4a7221641d75dcd0281
SHA1eef50b7e4c9068f0ae85946b23b7d95e961cb9c6
SHA256dcbfdd973d60f13ecd09c6b98edf6c51c0d7d2875e17a20ec295d34ce7345c45
SHA51296993dbc878800fd58a48a5d2c56ab00033b5c82b92270200e20a70651504514f47a7593e46192eeaad40c4e718aca43aa3d282e409259b97d28f2adf822afbc
-
Filesize
138KB
MD57fc882a3f8a7898969c9c953a6355f0f
SHA160de41e613f360dd22a44cc0b96b87d77a7fc8cf
SHA256d7f7ffe080f003a95efa6e0e1d5aba3f46a3cee831320fb4fc96291891b4c984
SHA5124f1263a6f1e09bf03e965391a7c93b788287dfb28c87ddbd6c25ad7377e9beca69c70080b04e5983da48d592d75b33167417faea5fa210f82257be38b0487c3f