Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail Audio Transcription.htm
Resource
win10v2004-20230220-en
General
-
Target
Voicemail Audio Transcription.htm
-
Size
817B
-
MD5
86d84274ea89df584729769c29157c98
-
SHA1
3816fc771339ab028b7a65ac529d79e607c4cdb3
-
SHA256
1b2a5fff695811290ed3f2134b9cccc4a096c2f875d0df69de2a74001fd8b8e1
-
SHA512
008ecfff2bfcf41819c0c619a59563b29548a45184605783e5f97edca713ec6ab3f19718769d94c7c194773c27be3d5405d19a7941766d611b837e30dd51bd9d
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237946870972709" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3040 chrome.exe 3040 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3040 chrome.exe 3040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3040 wrote to memory of 1060 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 1060 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4436 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 2380 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 2380 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe PID 3040 wrote to memory of 4688 3040 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\Voicemail Audio Transcription.htm"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3bc9758,0x7ffbd3bc9768,0x7ffbd3bc97782⤵PID:1060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:22⤵PID:4436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:82⤵PID:2380
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:82⤵PID:4688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:12⤵PID:1356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:12⤵PID:1248
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2960 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:82⤵PID:3936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:82⤵PID:3108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4512 --field-trial-handle=1816,i,10832318780478831334,6211567320361515007,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b47216827ceb680bbacde76c28256bad
SHA14484db9ba287668aecc7900d22aba7ae54e74ce5
SHA256e25c9a2fa7a8d8b329b4538c3ac02e8dcd19b57da148d5d06ddfd680c5f4c8d6
SHA512b16cdfc344887d7c1e1c57d3d30e1ea05472efecbce993d0f98f065c3d0420d6d9e3573083f83ec7fb832e8d94f40df9069e817adb56eaed953f6ddf0ae17dbe
-
Filesize
539B
MD5eae8da304ba60d967bc186ee011ff544
SHA10ae7965321bdddaeb054d65ffda5ff7a2ca76671
SHA256a8f86da2f1ae232b1c8b7c349e35417d7b72387930489a957ad4ce1f2ef1dd3a
SHA5129c3f44418a60781a8c0f4006e43a55dd7fbac83e0aca4fdf49b5d1daeb65d8e27112ea08d39921ecb1e75c87128b20359100b44d2246c76ce469a1c101cceee0
-
Filesize
5KB
MD5979f56e29799057274d298e55973e41c
SHA1861843c36c56ead05d028cb7b435013cd8d25828
SHA2567258de6ba7ddcdd03b0fd725f6a494ce4aed9fc87e522857909a23dedd078a0b
SHA5120598fb5a66d27da11732de4aae3ea831aa8d9dcfd9d24d1fd7adb60c690259f0299b47223ac3487f70cb8818d62a4a811d31b5bdb844a475c1d68d845fe714b9
-
Filesize
5KB
MD5f35825c56e834865fa0419618c230ceb
SHA17af3903ecfaf4b991de1021ea5f92043182cabab
SHA256a9982a8cdf67e75fbbc620e58b0f30cc10f4ebd15f7fd30dd658ba6691c0b481
SHA512ae0e29c456f330bc611cd3e69a2625d2ee31a418ab6f9ca55bfabb9c5c4efc25e73444cb15f1ac458851d804ead5645d5561e1866ff24316709ac928c3fd3ea7
-
Filesize
5KB
MD56c293c8a008ad780d99c6124f25c933f
SHA189a7a25190b80a0b210c9ba90f75934027a6666f
SHA2562a9cb8c3a571f39929390380215ff4d40c2ffdc6ed0831f3f790ea3fe86efaa0
SHA512aab7116038d4a331776f59cd10732f3bb90153f328a6af45ef7db1b5cee8c8aa669d50d6432bc926cc581f054e68c974ef2603782727e4d716417c8d7b578df8
-
Filesize
143KB
MD52f079e68b1c3959f5f06c4f3072398ef
SHA14b92d06205033502085ac0032e0f8c12e37c2796
SHA25608b5c66ca765bf87e64efdfcc975a09552b0bf1cacc121134e108b7f05908f93
SHA51262164cde80de09eaf68cf90c0ec63dfaff405d7350931febae92b65b58f271d47ce6d25dcfda1b3639ac331bbd2109062fdaf79ede55779b6b1216218ca1e76e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e