Analysis
-
max time kernel
25s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 22:09
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w.deliveryslip.com/[email protected]&mg=d3ef0654-d8d7-4be8-b1e8-c17a71e97c8f
Resource
win10v2004-20240802-en
General
-
Target
https://w.deliveryslip.com/[email protected]&mg=d3ef0654-d8d7-4be8-b1e8-c17a71e97c8f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133706525781082602" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4640 2288 chrome.exe 83 PID 2288 wrote to memory of 4640 2288 chrome.exe 83 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 1924 2288 chrome.exe 84 PID 2288 wrote to memory of 3124 2288 chrome.exe 85 PID 2288 wrote to memory of 3124 2288 chrome.exe 85 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86 PID 2288 wrote to memory of 3780 2288 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://w.deliveryslip.com/[email protected]&mg=d3ef0654-d8d7-4be8-b1e8-c17a71e97c8f1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6c55cc40,0x7ffc6c55cc4c,0x7ffc6c55cc582⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4544,i,16354350759265826787,17082377666974838673,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD530c5c44d26e7c5a450eba0e35fa7caed
SHA14ce36cc4babed92f6d67b706573eba841c460833
SHA2561b20eb98e2d075ce0e313279f9376bf4fa9d23ae0990fae9f57db5022331088f
SHA5124e55d7980e0d15d5d9b4d4bfc7d63938e6b714bce9a188939e5a75f8879478e513a82e9fec0d970ff73dfc8517e7217136ea99ef61be42a8f456aa2d53abc8b9
-
Filesize
288B
MD5a1a97b092231863d74b27fad706cfcac
SHA1f90ce165e6d4f523520a628da652018ab0336195
SHA256b79544c28ec8146213bcf73a77d4b5688a5feb7c823de7e6006702a0ab8ba488
SHA512c8752693c6862fe37abf653d6efa8321bfc85f74d56cd48dc93c9fcf59e4bdd565a79f06368d930069081aae18742021d5b5480de238c1287a095e15607d87ea
-
Filesize
1KB
MD5d78e5d5c4fcb777bacf88160864cfb55
SHA1f4d2f00e28e7253615572b90d65ddc20e567ebf7
SHA2569a3353df9ed85f0ac2ad57618fc5315d677247d269349895604cf3f75d6e4be6
SHA512f7fee16d137ff0cb621fd528f9fb5255b4bb7c9a683eba969d0965caa94e80eb4aeafe50d4aaefa6b250751394a0630a08b745023607dbeef98cc342eecb5d2d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52a9321a0319f68df0a4045b8e5d9a1e2
SHA1ca3cf1ae502353eaa5b2a7f8233ca21000db5453
SHA2569889ef1b96c5bff445a0e491a3f7dbd8fda869c93ef8898b6659f32d97a64a8e
SHA512617758fef3900a6a6f3b82e0d2a4cda2c6bb3ed0c30af32604dd6eea9955199dd47aa15936c01c84050513a001adb05168332c8ea96e525b74607260ad6f7b28
-
Filesize
1KB
MD5614973e95099e401f0d279dc66f9136b
SHA167d73af1c304c552a599fb214a9ae537006ed31c
SHA256d80d332150dd38657ea67a24dafaea0cbbe03a00a0d15f15fe9050f4b0da83a3
SHA5122772b590a9ddfc8b36cbda0069e6561bd599d3ce03f248e271fbf6094eabfd4593fd2578188448737e915021e034c70fca8f89e8f41cc0b3da34c1ab34b34804
-
Filesize
9KB
MD570bf5b30b19bfb914f3648857c76adff
SHA13da2e6401f1c997a6b1a79ea312455ea380ad6d9
SHA256157525b62c72509c500d7701eba12a9cefb3faf5726fe37af8cde4de4ca5c29a
SHA512ec306e83da51a34e0dca1ff6db58798ba3012e2b2026668c31d83b8b3d15b3e5fc42865067ca52aa2b90c1abec1c3075a7b2eca6f3767fd8f257de6f6be7fbc7
-
Filesize
9KB
MD53a8ff52e430d6ec2209d6b3c3bd69402
SHA11806883a6b11105e85eb456869dba77f032112c8
SHA2567c84a6a628f000b44a2710fc09d204cd54ca71a085ff622953c95dd4d60810fe
SHA512c2a9d39c317d99a8430fe91b033f1f013fc2ab90a79bc0bb84b644e2b75e3b15295d9f6c64559adb34c7aa4118cefaaf6fca4cd17603d1f67fba8a372871232f
-
Filesize
99KB
MD5e35965b12ad5856381e5d47000af7a5f
SHA155fe5166130f15bf13de573b46d4caac5103836f
SHA2569ec56471f47df2b9f8caf830b18c99e5909229e917602f2f3bc8a695dbbe7e9c
SHA512ea71770417e5bdcd3b67f7aefe03a1626ec5a223711c380bb5632f68d3b15f3845917e9f62fa40159eb66d671b96243e42313324cedb5c469c5cef151bba8409