Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 17:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/click/30832760/secure.concordnow.com?p=eyJzIjoiYTk0QzR6eXNWdmp4V0ZVVnk2YlpYVm1rM3djIiwidiI6MSwicCI6IntcInVcIjozMDgzMjc2MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3NlY3VyZS5jb25jb3Jkbm93LmNvbVxcXC91dWlkXFxcLzhjNjUwZjE4YWZlYjRhYmFhNzIzMWU4YWYzMThmYzY4XCIsXCJpZFwiOlwiMTY1MWFiNDBiMzhmNDcxZT
Resource
win10v2004-20240802-en
General
-
Target
https://mandrillapp.com/track/click/30832760/secure.concordnow.com?p=eyJzIjoiYTk0QzR6eXNWdmp4V0ZVVnk2YlpYVm1rM3djIiwidiI6MSwicCI6IntcInVcIjozMDgzMjc2MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3NlY3VyZS5jb25jb3Jkbm93LmNvbVxcXC91dWlkXFxcLzhjNjUwZjE4YWZlYjRhYmFhNzIzMWU4YWYzMThmYzY4XCIsXCJpZFwiOlwiMTY1MWFiNDBiMzhmNDcxZT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673538898952869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3948 3132 chrome.exe 83 PID 3132 wrote to memory of 3948 3132 chrome.exe 83 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3624 3132 chrome.exe 85 PID 3132 wrote to memory of 3136 3132 chrome.exe 86 PID 3132 wrote to memory of 3136 3132 chrome.exe 86 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87 PID 3132 wrote to memory of 3008 3132 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mandrillapp.com/track/click/30832760/secure.concordnow.com?p=eyJzIjoiYTk0QzR6eXNWdmp4V0ZVVnk2YlpYVm1rM3djIiwidiI6MSwicCI6IntcInVcIjozMDgzMjc2MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3NlY3VyZS5jb25jb3Jkbm93LmNvbVxcXC91dWlkXFxcLzhjNjUwZjE4YWZlYjRhYmFhNzIzMWU4YWYzMThmYzY4XCIsXCJpZFwiOlwiMTY1MWFiNDBiMzhmNDcxZT1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb6b7cc40,0x7ffbb6b7cc4c,0x7ffbb6b7cc582⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1916,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2056 /prefetch:32⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,6158369268654206469,16467980487948939767,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD59d5b54eb23b13253e15e1207eb3a89c8
SHA1a78b077f4cc96d0031a6dc42bfcbdbef716230c9
SHA256c93f82a8b043e03d069fedac8161343c8d2726f4ad582f5a55505e445b1d831f
SHA512185bcdbe7f32fb5a282f7d8d983b8d348105675d4034ecf904e97da01b86cae1a8da49e18743c37edf6227fa281973461c2d0185b861d0c49b8b9cc5eb7b3057
-
Filesize
1KB
MD50f632541d2443ea958af294fe0d2ab30
SHA1d94971ee09b8b50a7e3113d4ce0da57e211753bf
SHA256bd9e1169eae9b5002fa819bc3368aa3f15c0159a5a875acb8be310b4141cbd32
SHA5122f9c45da6f4e7d246af311808bd6556b871c6598c9f69a1695451729ad1059528df6c24f7312f86d3d55a883bc80aeeeb02a0fea2267182959768643c0f5b22f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD53303026620702f8fdc0d225c46f39a83
SHA113cc0bf969b95fef7d09161bd9519a2bc4c4a002
SHA256ad76ab503c61242948c45e2da62fc8ba448947b1caf3db95f8b5eea7b2eab15b
SHA51292937afe589bfcdb0d3c2ea02b99a6141006fd0fb14b95cf0c84458969d9cb89fe4f365737fcb878b905b71dfd8726a443736ac0dea2eb2d6ce02928ad90ec53
-
Filesize
8KB
MD5db50751ddd4b4fec964da15013aaae14
SHA1fbf3dda052f54d232b7cd58c6cd2f7547e417662
SHA256d99dc878a9ed55ec8453d85e107b49c08c3bcf5907ed7fd4eda518f0d9f6e112
SHA5126d8f54a7c82f437f214591bdb1cd81e5bc7f66c01dc0b1034ce8c9d049073aad05135c03bcb8a396f242bcea766c9e6c39a8940b77c8ae5377667eae1b9279e7
-
Filesize
8KB
MD5f1aee3b3e6371257ab228b2b9111fd24
SHA1d0bb965ad2dfbc2a6c637757b6c12882fd7be4a3
SHA256d788a0f384aaf8e7244f97f882e92ca1a52543b036cfbe5251376352539f6725
SHA512b284a2ec6ab816f048f4be9118f055b8dcaca7d4a6a7daf90c4a36211a60573255902f639d9af87a523fe1a06545efbc2317a8f5c9e7afb48a13dbe58ceb9e69
-
Filesize
9KB
MD5d677bee2bb732a2347c52707a57135a0
SHA1ebc1399784712553c620e99f0769aab92bc222b7
SHA256c98b38f0d1355c7b60dd3eb79b0672a6510fc3f9903274a388589767c66bc8b4
SHA512bfc952a39551bc00b9b818e3d00ab406c3b937f8da57254ab484d6b3c6a91808f55e69655cc31f60ff7d70b9a0f7b75eeea6c2ad8e0c0d204f61bab2e9d01ef1
-
Filesize
8KB
MD5f06108a35e849b01f1de3c2fae60bf72
SHA1ad87ed28872dcf377fff60f6ea1d2dd451d146cb
SHA25683a9d36971a9301910fd4564841a18e41515e93823495fa1257fd5a4d87f82c4
SHA512c873ccbdc1ebb61beb548856ac64461937185693b46c406001805b04940046e7f8a4db43460658064f3f2f1562de8d77379c5b573cd9c88bca01dd724bd13394
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\dfd84808-c7b5-4b01-8cac-f8a3f126800b.tmp
Filesize9KB
MD570d4b11fa28bd50d188c2de2448f5011
SHA1e4ff32c9425666d6cda55a5725b50808c47905f8
SHA25603d8889e4a9aace359029cd0244a05ed006f3d2e6fc53893938033927bab1402
SHA512502a998c47e59e3a07edfbab0b5c07acba59f1ca714cc78d1db0931acc73751bbb3a7aa44986ada6da1758e2c5345158e028844fcff035b5cd4d356eee186c61
-
Filesize
99KB
MD54be23079cf147ceb570a539cbbd4f9b6
SHA1d71032ffbafdbabf818eca83e2db5762322f693f
SHA256b69ae03a5227fb439ea88d903056fecb4e69da77903d98c61030ed0f36375f0b
SHA512b4e593f96d2fd9ae267262b4cd6a319758b2970b3c3aac0f68a439b3a0f0149a17d6bb50e68044aad9e107f9b8ebf3ff460d26fa76685677286396214fb8c30b