Analysis
-
max time kernel
10s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 12:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sm-redirect.ind.netcorecloud.net/vtrack?clientid=107311&ul=AlUFBFNQBU0HTgNaWwhXJFxfUQtGSgYMRFZZVwxdJgcPVFlDSlBdGQ==&ml=DVQGA1NTAk0HTlMADFIAGA==&sl=dh1nSzYwT2J6Zh5HWExAAVxfRAdREEsKVlMZVwBMBQwUVlNbC0ZWSwgBF09R&pp=0&fl=XBVBR1lMHF1DRxZCBhIfFEpZUk9bCgFOAAEFD1cBVlNfHVFHSUBdEBIMTgJPB15SHFMJA09XWVdOQhgHXFhJQ1U+WFYNFlJdBh0=&ext=cD11bnN1YnNjcmliZSZtaWQ9OTUzNCZ3dmlkPTAwMQ==
Resource
win10v2004-20240802-en
General
-
Target
http://sm-redirect.ind.netcorecloud.net/vtrack?clientid=107311&ul=AlUFBFNQBU0HTgNaWwhXJFxfUQtGSgYMRFZZVwxdJgcPVFlDSlBdGQ==&ml=DVQGA1NTAk0HTlMADFIAGA==&sl=dh1nSzYwT2J6Zh5HWExAAVxfRAdREEsKVlMZVwBMBQwUVlNbC0ZWSwgBF09R&pp=0&fl=XBVBR1lMHF1DRxZCBhIfFEpZUk9bCgFOAAEFD1cBVlNfHVFHSUBdEBIMTgJPB15SHFMJA09XWVdOQhgHXFhJQ1U+WFYNFlJdBh0=&ext=cD11bnN1YnNjcmliZSZtaWQ9OTUzNCZ3dmlkPTAwMQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674197327200899" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 688 chrome.exe 688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 688 chrome.exe 688 chrome.exe 688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe Token: SeShutdownPrivilege 688 chrome.exe Token: SeCreatePagefilePrivilege 688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe 688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 688 wrote to memory of 768 688 chrome.exe 83 PID 688 wrote to memory of 768 688 chrome.exe 83 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 1388 688 chrome.exe 84 PID 688 wrote to memory of 5048 688 chrome.exe 85 PID 688 wrote to memory of 5048 688 chrome.exe 85 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86 PID 688 wrote to memory of 4984 688 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://sm-redirect.ind.netcorecloud.net/vtrack?clientid=107311&ul=AlUFBFNQBU0HTgNaWwhXJFxfUQtGSgYMRFZZVwxdJgcPVFlDSlBdGQ==&ml=DVQGA1NTAk0HTlMADFIAGA==&sl=dh1nSzYwT2J6Zh5HWExAAVxfRAdREEsKVlMZVwBMBQwUVlNbC0ZWSwgBF09R&pp=0&fl=XBVBR1lMHF1DRxZCBhIfFEpZUk9bCgFOAAEFD1cBVlNfHVFHSUBdEBIMTgJPB15SHFMJA09XWVdOQhgHXFhJQ1U+WFYNFlJdBh0=&ext=cD11bnN1YnNjcmliZSZtaWQ9OTUzNCZ3dmlkPTAwMQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffeed8cc40,0x7fffeed8cc4c,0x7fffeed8cc582⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2496 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4596,i,6341112779626559668,16459192529775302090,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD55266c980d8e30ba04e397c5c9a1443b0
SHA17e44e4fded74d51f8581a9fa87f380b11a80c8c0
SHA25641b61c5101976ef1b06487bf6b0fc18cb87839ce1f863dd30f09eae3f7541e72
SHA512976a7fafbe3d039828525c11aa899630ee655893f65fcafead493deffbe2cf10b2de8bbb1272f63dadffeffdf6e349f1574e54feab7bf87593fa6f6718cddc16
-
Filesize
99KB
MD5c32422c6fed81a74cb20012f95a7f145
SHA158c3648e309341b320b015ed00b553af59aa2d65
SHA256c5b2f426aa4e11f16f75fa944c20d80b8bbe4043a73968fd9ff33ac336082e68
SHA5123a70356e765f150fb08643857d93f6397484aabac0219c44c1c73a1454808ebfa3d6c73213a71b1e2b6e5f5856ecc8a250fe2c09704413aabcee0c1394a27136