Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://substackcdn.com/image/fetch/w_520,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1900f13f-36c9-4699-8fe3-4e286e3ea00d_520x271.png
Resource
win10v2004-20240611-en
General
-
Target
https://substackcdn.com/image/fetch/w_520,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1900f13f-36c9-4699-8fe3-4e286e3ea00d_520x271.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643367442518054" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1264 chrome.exe 1264 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1264 chrome.exe 1264 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe Token: SeShutdownPrivilege 1264 chrome.exe Token: SeCreatePagefilePrivilege 1264 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe 1264 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3300 1264 chrome.exe 83 PID 1264 wrote to memory of 3300 1264 chrome.exe 83 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 3964 1264 chrome.exe 84 PID 1264 wrote to memory of 4148 1264 chrome.exe 85 PID 1264 wrote to memory of 4148 1264 chrome.exe 85 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86 PID 1264 wrote to memory of 2400 1264 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://substackcdn.com/image/fetch/w_520,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1900f13f-36c9-4699-8fe3-4e286e3ea00d_520x271.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbab7ab58,0x7ffcbab7ab68,0x7ffcbab7ab782⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:22⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3600 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4472 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1904,i,9079693238224168751,1810956156393971934,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55a6c2c2e21708db73a1e32ba231ca22a
SHA1f60a20f585ffb95934f4a46ed4fc95bd56e10745
SHA256400755db82f961332e2c858e0b672106c20ff3c084730144325ac01cae0e10d9
SHA512c0b6d3f72cb692e5997ffe8b2bc9b2032fca287f0ec6e8e668565801501f8585fc2304053155861e1e922ab6c28a07c1a200ae04da880fcfb7246922e3a47e88
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5fdf96c727a7524335c673cc32b2d9960
SHA19a67491aed9b413a408b13b1427be5e202bd6aef
SHA256629244289c4197bddafc511fb970e65d5d93d780af3fe2e0f04398c5c147d150
SHA5120b66bc91d2edc2bc4d8289b4e747402c1facdbd76651c4ab39311ac92e9e2574a7dc4ff00afdf1c7ae9d06215495ae024276fe1f3c319cc0c6badac73f59af5c
-
Filesize
138KB
MD529dc684849e14aa3d46801b103943e4b
SHA184171a49b09c6886edfc0d7bb19c0a85290d61da
SHA2560362c022297ace4ec641db499bd42fd35fcadf98db07616224f10bb8234aa4f3
SHA5128d608763c7a0f100faa6a2962615db42bcc22f14601789e94c0efe8cbd17d10a88ee374e7f54a5cf492f63dbfa08c797809c6e10a7d89a0f98d12a4ffa3bd946