Analysis
-
max time kernel
38s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://https:/click.novoco-mail.com/?qs=5e88e5b38b8cd198bb2a1bf574502dfd42c2b9ffab465d2273aab9be424004c851fdd63ca46d282ecf9fb81899fd5b30b6b5f06167043718
Resource
win10v2004-20241007-en
General
-
Target
http://https:/click.novoco-mail.com/?qs=5e88e5b38b8cd198bb2a1bf574502dfd42c2b9ffab465d2273aab9be424004c851fdd63ca46d282ecf9fb81899fd5b30b6b5f06167043718
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729618736972607" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1588 1696 chrome.exe 83 PID 1696 wrote to memory of 1588 1696 chrome.exe 83 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 232 1696 chrome.exe 85 PID 1696 wrote to memory of 3052 1696 chrome.exe 86 PID 1696 wrote to memory of 3052 1696 chrome.exe 86 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87 PID 1696 wrote to memory of 3128 1696 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://https:/click.novoco-mail.com/?qs=5e88e5b38b8cd198bb2a1bf574502dfd42c2b9ffab465d2273aab9be424004c851fdd63ca46d282ecf9fb81899fd5b30b6b5f061670437181⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xd4,0x110,0x7ff90b92cc40,0x7ff90b92cc4c,0x7ff90b92cc582⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3020,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3024,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3044,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4584,i,14706615943730680092,12148595310244853339,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5543ea6a842513501f441f628e5b2729d
SHA15e802e55b733746254fc1c1c6a8bfc1124203629
SHA2568ec6746d4e06393f9abb088b431c16b581b137602ca930954566305b11432749
SHA512c52ce9cc85f85a1e8fd90b16bfbc4d590e2ab53c568937d021dcd4ca298d340364f81a8a4ac0803507fa1cf3b24b75deb3b912699ce71fb76409adf3290588ad
-
Filesize
8KB
MD5f237841d2840aeceebbac87149e2a1ab
SHA1212b7901ee3470c6bb508e511261204f295bd136
SHA2561b9867173c33e03bd8738700fc45e0c19051eb119f2d6faaae44deb67d93a218
SHA51268954da1d705cf764fc618add17e680a9678d86ed15b104a608a5b0d76aa254c97f17c5d4fc0f53cca20661fc09f6f1cf2c54366c2af2416aa26cdf00e1bf95e
-
Filesize
116KB
MD58ca4a2e3e7bde633b5999cd8de64f850
SHA12c0a6455ee22744d002a71edfda824b05d2a8a56
SHA256f7e3e4a2ff9f16bafe2bbe5ff2b8b04a305bf412ba0baa01ee12291205989daa
SHA512e145b9556d56f42bf9135dfc39213e9cc6b066f85502b0ef214ca056fb9db5cb77f86c0ec77448d94b93f361dc6621ab0c17884954a35e6ed50f14c2e216eb07