Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/open.php?u=30281570&id=931f6041d9384ff0b93309b4a4cceefa
Resource
win10v2004-20240802-en
General
-
Target
https://mandrillapp.com/track/open.php?u=30281570&id=931f6041d9384ff0b93309b4a4cceefa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705448085268908" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1076 4652 chrome.exe 83 PID 4652 wrote to memory of 1076 4652 chrome.exe 83 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 976 4652 chrome.exe 84 PID 4652 wrote to memory of 952 4652 chrome.exe 85 PID 4652 wrote to memory of 952 4652 chrome.exe 85 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86 PID 4652 wrote to memory of 3116 4652 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mandrillapp.com/track/open.php?u=30281570&id=931f6041d9384ff0b93309b4a4cceefa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xe4,0x104,0x7ff83db7cc40,0x7ff83db7cc4c,0x7ff83db7cc582⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:32⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2128,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4576,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3844,i,10152713198429899666,14035559442656821523,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e6daed838f3c6883cc5b695c99d725a0
SHA1fa1fe59860702a9155283e23a0f8b8cb43d8ca82
SHA256535811e45d210bb5d58e95034e7aa091dca5a52de02fe18bfbc0f888f425ae3c
SHA51293277223bdad12287b9fa06724b84bfcd17ad25de949a308c843c70f4876170436a8f3f7ab164b39eee269c9d62a1850324f7629ce0ce7b31d79c5c53e6d46e5
-
Filesize
1KB
MD5590103f84ec226db096e453ce2e70ca5
SHA11fcc75f38ac518493c4d0a9273b9fe03c7a43d95
SHA2565afb893b3a31e51c0f58e1c413774af313a46de86d36dce64b3ffc33205f44d6
SHA5124e08e7d9a5371b91b36dfdbecf24fc6a46ff65bf7cd7958538f98507396cbd7826992cf0c3afe8c85e611e82bb9af1f1f4dde04fa45c0a39874366e048fc02ce
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD580b967bb7a5784cec02044eaff3e247a
SHA129572ef3cb0df3429f800f1ea13928e145758ef5
SHA2566a1707fc25973a37356d9922eb27ab5bb525cb85842f8805d06ca958301ff026
SHA512cbf3f7c66f0147592835403bf9fae3eae35135e5f0021495c941434c69b0cd9cb1a28cd39e17e4063e56d244d6b3c7965d3a3b6ac9a37648120aa6ce1d6ace19
-
Filesize
9KB
MD54221c40a98913e93a31c4345b60ae0f0
SHA1b29a55314dd69cd409f62eb5dc65a87559513fd7
SHA256136c9f9e952d218ee59ce8aa0f431c21c68c3efcbe1e5c9cd0377194c27e539a
SHA512505784ceb4a61dd3af42d9d10fa9d516913648b4324adca8f9fbaffc254251888f8951ca610554ed74b86b08db34cc8a5408892357166439dbb0cf208714e600
-
Filesize
9KB
MD55a520dd6e2fa52e08c80e3352214b20a
SHA1f9ee768caecb4975c38acce9d5114bafab5416e7
SHA256edebb9f259989abf8e1dd88fb6c68aeaeacdbdead9f720c95df38d1d32f45015
SHA512bf40180c3de94dd2f465a593fa8ca914908738ee1b59344b0fe1f18853e0258759cfef2a1ef3c6babcff68704eac06128d1b6c44450141c7381cebb2c0e1eb2c
-
Filesize
9KB
MD5d6b722439164bb9e6a0ad737da4a1227
SHA1c9f4bed3c49238770f6340fed4d89d2ae5ed0edb
SHA256c1633a053e586e97bc54de2e2c29cada1c9d981859cbaa7c8183c281dcb78098
SHA512ed0d728262d1e26556eddf24c5826fc1bc907979fd84bfb9aad0ae8da9487a86481c8a55d00826f6241188a1b9962384ffb9bd2e47dd226b52d7a5220e182e4b
-
Filesize
9KB
MD5067e15718cc869db1cc154e477e3cf61
SHA1737e9501748135ac70ba79b13e419c763a0c446b
SHA2560739ec65a0488b25b5f10247c417f4f2378385f7d1bfae75c65688afda8929d0
SHA5123413efa79c6f3479e0f5972fa1ce0cab9decc7130f91546df4e77cc3cb721677001ecb22aa59ac4604b02061ba3c20534e67773d3866b09bc9c9cf9d9093e2d6
-
Filesize
9KB
MD563a1bee41d0db39b3a322df309b52879
SHA13f52724bd373ab46a6ad1ff1874fb447663202af
SHA256e10cf4a544b196019ffc8275f00245a7ad2eef1aef912ad19717970bed5aeaf7
SHA512e715bfe7f7e04270e046ebcbd226e2085691564a9ae67bdfe021903a7e50083a776f693e996093632d325aae77d1d678f35e6e0e3d3182cc74a38e6b208ca966
-
Filesize
9KB
MD57fecbdccee4f91258906be98bfb2a868
SHA11b7563d9a02aac547d54c8a23ca6d346ab845ed8
SHA256f9f649a46586833b8c7c5242a57526fb150d86d23be1ac6eb976dc00ef6cebee
SHA5124b4af2b71b7b70de12b0dc00431974cd937cca1159097bcc5aec6a9bb15b30200931af01b13cb5b453404ad3f51f85966dd94576bbbeeee74ddccc3da377255c
-
Filesize
9KB
MD5ef4260d57cc6c39a0b894404c756b43f
SHA192ad22ad260eee8de096ec084762e65e7d046b01
SHA2560d90751227d568b7b26e812979daf0ad0523eae74cbec93bdccc1a3bb66d1413
SHA5123ea7fe108cce32172dae21856099d980de53921773a45283ad69f29acec00cb159303c34750ad173966914d77804891af65147d5a68960eccc2f0ecc0800632f
-
Filesize
99KB
MD50bc2a822797ace1d1d69781a57b7c5d9
SHA18ebe6f83933d7913a18c07104b838bc9419da251
SHA25614fec42676f68277e046a6c324366c1b2c730d491cf49766a8316b18a87bc8fe
SHA512b55c47439c84ddc2919f76faa783c0a7e5df51925f266cfc5380babbec91568fc3aaec1fa6b6c689f556957a7bf2ddd0f045be108062aeaa5e51341f253b632b
-
Filesize
99KB
MD5a1147cb3695f12f2d910980dec8a57bb
SHA17146c5f7ee9133a6a36c5a800f65dd605a3c4140
SHA256a36eb1c08e106249c7d0e5e2d6ff9154ce542b79944426f9fa9305f2ca4aad75
SHA5123a615d55163a4719cd458517409130dc88a980c9afa0e463d20fd75fa5ccd8bd9bf95723a6acd62462fb65a9608e59b4236b155fc11599f3f92c2cb6b15fed96