Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
📧™ Payment Advice Note-03907.htm
Resource
win10v2004-20230220-en
General
-
Target
📧™ Payment Advice Note-03907.htm
-
Size
80KB
-
MD5
01cf9cf45f46220e87451cff3c5c4fcf
-
SHA1
bf98c106afa457bece8716b6149c4a46dc42d691
-
SHA256
8718eabdcfa470969e438f6aff7ebd2e4f87ec8a9495ad6d0b7e27dd72806e6c
-
SHA512
38b5efd690fe0b9f82d36112bd22429995a63bb3d8bc1866482db226731b889c448594374231041d467f673f99469db324640daab050569efb735b728bc35087
-
SSDEEP
192:rarn5yCr4p1QvrDp7JFVvEFg6IvEg1jzi4UKuNO24zrxCNMhQbqEh2XeQvewVVAR:C5yCkpE2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235118837193413" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 392 chrome.exe 392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3412 1868 chrome.exe 86 PID 1868 wrote to memory of 3412 1868 chrome.exe 86 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 1744 1868 chrome.exe 87 PID 1868 wrote to memory of 3668 1868 chrome.exe 88 PID 1868 wrote to memory of 3668 1868 chrome.exe 88 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89 PID 1868 wrote to memory of 212 1868 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\📧™ Payment Advice Note-03907.htm"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea3719758,0x7ffea3719768,0x7ffea37197782⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:22⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:12⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 --field-trial-handle=1812,i,3239868171990002370,5641026587820768249,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1d8d25a05e17cab31ec47346797e0be
SHA131e98eb79988e2d32bd1e867cd846982ad8e0848
SHA256ccddb486c8550927f96e0056b0ae2d779a5abc5a939c941284853ca9c81cc4af
SHA512c4f71ba8d88e83ef876cfbf51ddcba4b1d0c1c93f0969f0f608f561f69abb5c69f0b564f793c5c8eb84b822715d7577f150553e6f61cdf6ac84a174397b91e63
-
Filesize
6KB
MD5fa848c3dbcf79304e2cf8430f2bd45e9
SHA10a20901ca13ad52f95494738fda2df0f47d3892a
SHA25627b5e1f719ed4eef571cb49ca659d20a962e03af34bc02f026fde78e054a8b77
SHA512339e2f6a155dec847b940f79ead1a997d7e5412aa3bd2da1f6639573aba9ab600a1ae97db5f27a5fdff4d134fedd9b75cbc7776a04e71bef795657e3ffd2472d
-
Filesize
6KB
MD515aec54669bb420fba1da965a92f1072
SHA1f32a22234ea9962447d63d0dc6960d956c222a9a
SHA256037159f5f632a29e2c0f945a24163e13b9c88ebe4acb1eda6e60a0ea5e181441
SHA512c243cb396d0208a3b60d4a7e33339ccd73dea461e2803b5f2dd4fdba8c014c35537085b33b5e06f3f27f22d6c54d27d3b8e4ef404a207e1a9c9559703dd06c46
-
Filesize
15KB
MD5cac41228c6531a0ffd1950b0e9d070ae
SHA1fd030629f8a78a68499c8678b7adf515e22b30e4
SHA2563c8455e57b03b34ed0e3744357d7407abed3ecb8f0134a43ebbece57776422f8
SHA512fb4545929d87e4ca9820ddd899d4bce1529189709f6c3b21fa18580eba5ede819e4c77f4cc926a7358fbc39b791a96fb4858086508d000e96083e28493952910
-
Filesize
143KB
MD5c30d6074544efc0343d3fd3f3c8336e4
SHA1ddb6fd762d31ae7b495bb8dfa5917fe6034776fd
SHA2565d7534eff0f46c0e5f85c8eaa3beac870dea0da1cb79c26d0f0b51830166ba99
SHA512cde3b7ee8baaeb3f85c366fcabf6b5c4c5aab25b4d6a77e58683395929c445202f51629acbc87b3fe832fd49173514664f52a81f2ebdb054529d0d95865f3efb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd