Analysis
-
max time kernel
24s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 13:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=a226332958&e=918c26076f
Resource
win10v2004-20240704-en
General
-
Target
https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=a226332958&e=918c26076f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649198026263735" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 920 4232 chrome.exe 82 PID 4232 wrote to memory of 920 4232 chrome.exe 82 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 5068 4232 chrome.exe 85 PID 4232 wrote to memory of 4256 4232 chrome.exe 86 PID 4232 wrote to memory of 4256 4232 chrome.exe 86 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87 PID 4232 wrote to memory of 4484 4232 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=a226332958&e=918c26076f1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd769dab58,0x7ffd769dab68,0x7ffd769dab782⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:22⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4156 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1920,i,14713363680820437031,13456470826127228995,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD524b00232f451419c9fff9fec171eff17
SHA1cdcfa8a53e82acb63265e239ed3e648c5747be58
SHA25655a6de0c09b0412f8981bbddc2945653ef0522a6043b49f65fa6cde01aff3325
SHA512cfb0bbc3dc9354bc85aa4c8b57928c63da2272e4dcccae612dddf0b07fe9c6cb34c4ac20908c4f3dc687e1448105c3c63cadf3215c79491d5a69d00d99874216
-
Filesize
7KB
MD5f1ea9a4ae9fc63ace30bce78e8088331
SHA19c46e41d98af89029d4b64c0617204390b030c72
SHA2567f6c40bf271fb1261ca3b845672a91c4a3b5c7c6630a5e90de4e6c7c0e9afc01
SHA512d4dff520fe5d51f37191563586f9158c4885eb1f48c1cb8bcbeea22e8b88dda7b8f037157fe1d652a78b6f736c3e18ff63294b2bcd426ca5d95e2944525fa845
-
Filesize
144KB
MD56cece37cd1a57b5a8cace3d56dc821ee
SHA1c4d4326ea8440b4a8621bb5bf14e3eeb32d56f9f
SHA256fd8edf1195af66950fcaa58c477e76f54c4613f3bcc01684f16bebac7360f57e
SHA51288823ec3aef48a79a9fef2160fe418e16e68a89bf9422f5d41c64d7b5d6a2d4b48ce6d9f4e7b97d3274bf5de1c0efb6472afb1f967ae1a5a608b2ac43bc7771c