Analysis
-
max time kernel
38s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 19:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://unsubscribe-me-now. net
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
http://unsubscribe-me-now. net
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
http://unsubscribe-me-now. net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133658897584402363" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 5072 4240 chrome.exe 70 PID 4240 wrote to memory of 5072 4240 chrome.exe 70 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 2400 4240 chrome.exe 72 PID 4240 wrote to memory of 3580 4240 chrome.exe 73 PID 4240 wrote to memory of 3580 4240 chrome.exe 73 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74 PID 4240 wrote to memory of 4156 4240 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://unsubscribe-me-now. net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa7d179758,0x7ffa7d179768,0x7ffa7d1797782⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:22⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2652 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2784 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3736 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2776 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4456 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2436 --field-trial-handle=1848,i,17330250422398181655,10101773152024056317,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54e3b857fc853a9226daad46ba5c2c1a7
SHA164a1fdfb2b80366c75a576e38b40c4685e8a5182
SHA256a432dc3adf338c9717dc9fb18c75107a28810aecff346c30a0fe096bdea321db
SHA512c33da95f2fb8b3a21231968de581ba2b8438059a3e5df02b6d91a2f167908db9fcb435a2dc1d288a97920c7e81666f7daf2d15671f641634f018f1e8c96d44f6
-
Filesize
150KB
MD55f9b30636373e0c0227dc00a39dfd38a
SHA1ec026e5e56190086623523054a6192c65c9b71e5
SHA256a47b0e27dbff07bb739ca18d089c8d04eba8e5118f40c3a0b3566685eca417dc
SHA512a6e4157b3c407276077c6711a01914f3835b9dfb4e2d6b26df1aecbe6904f708d49a518bc215c3d5bace98982a9723b58094dcc758efc45a8d72e6c39a6fba80
-
Filesize
150KB
MD5039e738086459f45d754be0a1815c73a
SHA172359b3d1f59dd886316640f00f4800ee3e58eea
SHA256015009d13a1a08c8b2e4e3760f216354a7547bd92843f4f5637522cc0d53e2c6
SHA512b33ee66a8295d698faa9f124fcc34d7bce5da39f04050edf3093b7322b178242e8a3e8aed186c557a74d3463cae10ab91be0e0c2736ed52ce4adbb75128ddd86
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd