Analysis
-
max time kernel
299s -
max time network
273s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/08/2024, 08:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://linkvertise.com/1208172
Resource
win10-20240404-en
General
-
Target
http://linkvertise.com/1208172
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677525897224939" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 4376 2908 chrome.exe 73 PID 2908 wrote to memory of 4376 2908 chrome.exe 73 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 4132 2908 chrome.exe 75 PID 2908 wrote to memory of 2132 2908 chrome.exe 76 PID 2908 wrote to memory of 2132 2908 chrome.exe 76 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77 PID 2908 wrote to memory of 316 2908 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://linkvertise.com/12081721⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa02be9758,0x7ffa02be9768,0x7ffa02be97782⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:22⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2576 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2584 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:12⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1768,i,11409270647437121720,6586744519175307177,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675B
MD5370a0c3eaba962e0551aff1d3f1eb60c
SHA19b8ba4f26e730fe111d6b455f4cca932c16e24e5
SHA256cdc11d1fa9559792b1e8e12ded0c94bb65da5a125d0f81cd5f0ba582e8a2d4f9
SHA512f0d49ad1b2ba57cfc0737846d4a94f1cf45b9fde5d13c47c734274674635ff4fc41e92443b317bd8942024ff61ae1c23d70f889d9d2c86a3eca740712a5e8863
-
Filesize
6KB
MD5427e630861b8da6ae18dafbaa366727f
SHA10ec9be7f87cb112c1705aa131a00d746411d9238
SHA25671b76ed4d970725d6d610878ee4bb8439a4099c55571012d4300f4871f4b29d2
SHA512eab12809e108e1cad53dcd27a7271aa005d26eab7a366ed35c4a16fe089ce743982a87580e9bab5a93786798ca5a04b867aa94a2a749116c1b211244200af184
-
Filesize
6KB
MD5a895fc9c5962a40e24a7a569daf24557
SHA1a7040dae960ce9ede81348556f548602163811bc
SHA256adbeb82a2c74aa8ace7b7db70e0ea73f092a85d3a1fca7af15a37af982a2a15a
SHA512b0a4a7f52187f2a23375af876f2de289e77129d475e495083986b755b3dba964c148a456fd44b46f0e065c7ce9ffa08d16bc64dad38a0db2d41affe5ed3a5246
-
Filesize
6KB
MD5f64072cd47708c9bfa93928a8c21c6d6
SHA1bf8b3f0f802c001c38f52fd425d7d396db98f00d
SHA25631caf2e005653ee1b93dab5b9c6d97532f10ecc4a3b62b9fdf3c1c8566410b69
SHA51249ebe3cdcd2feec2a4d9e990a7b9132b8733ff441598ab4b4f767baa02385d7e5ba30240bde33428cc0fe15952a8c777ef11eff105d2f0c671883a02d329f5e6
-
Filesize
136KB
MD5bb08c3953435232ec10ea5c323a518ab
SHA122dcdbc8e14aecc07b79de4748d5dabef13e9871
SHA25655c2b8c81cc309ba411546f4f334c967e94802daa20d58e812cece0b1f360fdf
SHA512f180c031282551543d1e741d4a36e6283a7c964fa4c36cfe37e8e22f6a6fe1bd69de43c25edef0700bd484c476363603327f3731b0de811e85e48ab5928c004f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd