Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 12:59
Static task
static1
General
-
Target
Invoice-2023012348796490720230123487964907.html
-
Size
49KB
-
MD5
8809af8f5be18656c2036768f1a54f83
-
SHA1
f2d03c02a8ad93892574b601fe1361884c73fce4
-
SHA256
dd4d0cd244d3cbb26bb24d980e940d18d8d8bccffdb52a14cfde912511b902fb
-
SHA512
235e421de82607630d1b73878164637253519b7b3cc6e2cdf0682f17ae8e2742b95a13e1aa409ee1cafb7e193883e823983d2d16a4a7ecce6e1cc4d855771b7a
-
SSDEEP
768:ljzt8wNy3pvA+G1HeFAJCybsi36WtMPf5bPKuUDZAmFwBu6d6DIh6AqWce9pRkky:lj/u1ANeFWyBnAwWQU3l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237943810651720" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2552 chrome.exe 2552 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2552 chrome.exe 2552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe Token: SeShutdownPrivilege 2552 chrome.exe Token: SeCreatePagefilePrivilege 2552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe 2552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2552 wrote to memory of 4304 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 4304 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 840 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 1960 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 1960 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe PID 2552 wrote to memory of 220 2552 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Invoice-2023012348796490720230123487964907.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc80009758,0x7ffc80009768,0x7ffc800097782⤵PID:4304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:22⤵PID:840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:82⤵PID:1960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:82⤵PID:220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:12⤵PID:4648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:12⤵PID:4416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:82⤵PID:4768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4764 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:82⤵PID:1608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:82⤵PID:4956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 --field-trial-handle=1816,i,5610190774324121267,2010297443656676546,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cc54ce71e978cb8a60327d7f3dafd811
SHA13b4aa7607c993b9b2dd87aabffe9c9a3091c76e4
SHA256bb0b4695b38740f3c24962b2c5a34c0c125c5283369a2d70b79dbdb8c172311c
SHA512cfd3b9fe6c42a42708eefc2ecc7a9b7b6ad9aff67d3b1aaa0a3a5cc8bf037456b65dfc25a37f4c19936813eefabd2ff8d30477a3648c4b6f1a0f2fb02a2aaa9b
-
Filesize
706B
MD53551c5e433ebb34472aea43cf04c112c
SHA1e09ad135d5e024d9da8ad845a4774309cd1d34a2
SHA25658397a1358aa6b8f85f89e641874a26319549c229f708bc5fa76a8ddacaf0c32
SHA512c0bf1ed0e49ace8e8b8050bdff179d0407bc7e460e599dbeb028b7aed7ed4ca73841a63a637b3e49ec7f72d6b30e2ae170b377cecc3feb302071516b9027fe1f
-
Filesize
6KB
MD5ce349fd881408e116643f0faaeb33a0b
SHA179ee289f1ae4a54b067ce7c6701085a9e863bc42
SHA256ecb52beb07e7645be870012699f07470f4c444f37d48be0f3d05e990778f20f8
SHA5129e7927be2afd362f5070542c9058e501c7994359cfee7c41bde629188af1c33f57f0ca271c142616db0f20b019ba35fc023e9f68b9adcfb4e00c26f25eb55808
-
Filesize
6KB
MD5f501dfd28b99148c7a5c06308a5fb65b
SHA1d7c724cb3425f495a186a7a2a2f7d5da4b87915d
SHA25628c49211368255dfc73ac68e42ec487732758c1df61917baaa91e570c290a414
SHA512e1b657cd7d7c25467901b5a79eb169f416ada7d865027420892665a03b16882f5c476322d1bcb65601c99cd26f3cbdba70bac76f33fcfaf35af5b006a62ccedb
-
Filesize
15KB
MD59d8f1c913471f03705dcca6a8669bb37
SHA197c851c19002658faf1fc7a103abff8942ff9c27
SHA25638be319bd57f76201d61d9c7372310c3ac69e17f0d8628105d42c07c848b99d8
SHA5124a7e20763c55c0b18a0cc4e78b31e4fe8a082d7d98c1970c8ec27df855b9326731a2def853e9fa6fa56979cf6ab4c16b1938221fb1b28a05a86667060eca13d3
-
Filesize
143KB
MD56d3c44e4bf37e8b3f0b40dfcbf20befa
SHA18fa271a1ce60b7f4ba09a7770f62c2b6702a67a9
SHA2563d52250f7d639eb8c5bdef094de2631834eefcffcaac2550999b4e955d475cd1
SHA512c59e9a7b5b246deb1388014c9f340546e972cd589dc11eee0faeafecabaa8e5402630f95dc269647377b046a4483013d44f16094e3cca89c840a6469c4e49ecb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e