Analysis
-
max time kernel
25s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 14:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://logicmtr.page.link/wLSJBFuKpc5tStMWA
Resource
win10v2004-20240802-en
General
-
Target
https://logicmtr.page.link/wLSJBFuKpc5tStMWA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675140649409118" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4252 chrome.exe 4252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 1216 4252 chrome.exe 83 PID 4252 wrote to memory of 1216 4252 chrome.exe 83 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 5052 4252 chrome.exe 85 PID 4252 wrote to memory of 936 4252 chrome.exe 86 PID 4252 wrote to memory of 936 4252 chrome.exe 86 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88 PID 4252 wrote to memory of 3008 4252 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://logicmtr.page.link/wLSJBFuKpc5tStMWA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff97cdfcc40,0x7ff97cdfcc4c,0x7ff97cdfcc582⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1992,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4372 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,11909216169344534872,8482689542906718077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5f2ea6450bb8f7f695128230cc1191f27
SHA1a893b7e30456b5e910310431706d2970e140847c
SHA256c9ebf55a931fb12feaabb4a5f50bfea1e9b6728d54d4dffb1e656175be0fea47
SHA51283bd49b3a77779ceaeedea54e13d5e7376c336a02cf48f0339732a071f106b8eb0a208f1ebf8825579ccb22bdf27c84364492306d8d6b4dc3a899dfcfaca14bf
-
Filesize
9KB
MD5e00caa4f6f7229e36144c8850bbc7001
SHA1b7f12c34826269d5d059345c3264a402c9db265c
SHA25642626fb2d0eda48bd746fc5f79d72600767f29594ae9eff937345779ab796ae6
SHA51273d8fa7ec35a7d699391e1984c8ad22095c3bdb63ec2635e426d6431c29a9a72e3fec703310c2e23e14cd6539d8ce5361103a5ebe7375f12416ec4049080a94e
-
Filesize
9KB
MD557f1c1154d11a3aedfc8037465b9ff58
SHA1d4dfa84ed416f91f8edd15a87800e22654e79d85
SHA25681f9ca0e378f05b54463efd451062434717c91cd9b817797aa68fe3e4b886db1
SHA5126700f056163b68c8f677dfd746c76f86812350fd653868fff73d7fa923608f7e39708f978380dd274d3a86ba723043b051acd74769ea02fe9827505999060ab5
-
Filesize
99KB
MD5783e50fcd5379e3fbb9241935f348a87
SHA1fbf7274fbad358f39402d98def93ac4449d739b2
SHA256a5e20fa91a41981e41bfebb9e920bd8a6ced9028b6e7708f08d6305681ef41d8
SHA5120a9d789225317de3be99585076891185386b7f80202ad70dddae8cbda1ac51cf6b0890f8a854a2c51ffe3d2030dcded65ea5ad294757e8261de73554557791ee