Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2023, 21:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/us/smarthelp/article/why-am-i-receiving-emails-from-paypal-when-i-dont-have-an-account-faq4172?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&cust=&unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&calc=f741600c377b2&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.151.0&xt=104038%2C124817
Resource
win10v2004-20230220-en
General
-
Target
https://www.paypal.com/us/smarthelp/article/why-am-i-receiving-emails-from-paypal-when-i-dont-have-an-account-faq4172?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&cust=&unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&calc=f741600c377b2&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.151.0&xt=104038%2C124817
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133229612182266669" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2004 1680 chrome.exe 89 PID 1680 wrote to memory of 2004 1680 chrome.exe 89 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 1776 1680 chrome.exe 90 PID 1680 wrote to memory of 3996 1680 chrome.exe 91 PID 1680 wrote to memory of 3996 1680 chrome.exe 91 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92 PID 1680 wrote to memory of 3128 1680 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.paypal.com/us/smarthelp/article/why-am-i-receiving-emails-from-paypal-when-i-dont-have-an-account-faq4172?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&cust=&unptid=48a07fc0-bf5a-11ed-987a-3cfdfeef81bd&calc=f741600c377b2&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.151.0&xt=104038%2C1248171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1d779758,0x7ffd1d779768,0x7ffd1d7797782⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 --field-trial-handle=1868,i,7735817688433682541,6495407180475629673,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD5d19d97a944bc7d5984a66fad4abd3cb6
SHA1eb8922cc5d620b9d001792e07f5d40b7d327e328
SHA256881303f1ab2b10c53864560afa0667951ae6093f895c0f0b45a2463a9e072d1b
SHA5124928127e3bd5b0f46030a73bce470203ed7d707c890d4cfe6d067477b9ff6c8e58ae42eab99e0c9e08973c15f7e5d519077f3dd06fb24d799b3fb9a69df3bb70
-
Filesize
2KB
MD5498738aec970d3f08df7d948215c5c29
SHA1cf5d5066132b6435ca6b7bbf3ea532a92c36ce1d
SHA256068abdc3e63d2532f91b98bb9dbf8942c39342e7d2677965f57d630f316e3118
SHA512dfa52af2ee3fcf67d099a18c80a2f97a0c976fcca95ef201d9a1ec7f68f4a3ec9e4ec1247d8f9a19c8ee1e95ac8c10b0947cceba5f048785554432c8d2ce537b
-
Filesize
1KB
MD5e7c75827f0ef9f23ff59153d0da06374
SHA1653f227762c418c113d7272feaacc231b3c16238
SHA256162670b52a6fbe88df496d5419c82453f0ac52a4d913afc406c7f2ddf28210e2
SHA51258fd9e44fb146ec43f1c252d667dfc1f02d17e98811323f37b7b7ac73c81245f7d483d7f0dc4803a14a682a001bd55f7d53df7ce627156831e70839d38d6f89b
-
Filesize
6KB
MD55b45b50256db2bb77dc1b033b8aba5bf
SHA15c967e340c2b0cc34aeb18958dddd836c25f7c65
SHA25679b9cc340fc131cefd6fc5b47b303b69a123c43763b8790ca1bbdeac249d6c6b
SHA512076b49f282140dcec88d74e98237875ab9d653324b2cd9c6ec647019049bb500ae181d061a98a26fe33e1c4de22298acebc26f03fc1443b7253da6f9e46e94c9
-
Filesize
15KB
MD5b6fa464b3bed0896973f2be376fbec5c
SHA1ae3929e071b0f531a5d77d2fa8d2621898a93770
SHA256ed0480e839d6579eba5fca58e428f5e644cb133f24124b4c9fea8f017a7299fe
SHA5129d200f9d83cbfd2fbf6d856c635a95ab760c5462f9d59f8e9a50a3d7aebcc74e93e9e5ccf2c53deeba72fc6c21062c043409f30b3ac413bf251c232fce2fd182
-
Filesize
143KB
MD539413c31beba4a4c68699ae63b91b526
SHA19df9b7bf44950b044e691d548ca4484f98549e54
SHA256dca62d5f20810e98f69226cb71c80ff442d2674f843447eabb49a45d30f5bcdf
SHA5129a0f5fc914890e330df2bbf4d27a93688cf11b202227c4120aa8e96d11bd4bc11da17508b2731a3c7ae63ea79eeb6ca0a4dbb68e522e6d47ad6faa440c083472
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd