Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 14:30
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail Audio Transcription.html
Resource
win10v2004-20230220-en
General
-
Target
Voicemail Audio Transcription.html
-
Size
817B
-
MD5
86d84274ea89df584729769c29157c98
-
SHA1
3816fc771339ab028b7a65ac529d79e607c4cdb3
-
SHA256
1b2a5fff695811290ed3f2134b9cccc4a096c2f875d0df69de2a74001fd8b8e1
-
SHA512
008ecfff2bfcf41819c0c619a59563b29548a45184605783e5f97edca713ec6ab3f19718769d94c7c194773c27be3d5405d19a7941766d611b837e30dd51bd9d
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237962269926949" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1524 chrome.exe 1524 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1524 wrote to memory of 1368 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1368 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3592 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1576 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 1576 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe PID 1524 wrote to memory of 3312 1524 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\Voicemail Audio Transcription.html"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:1368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:22⤵PID:3592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:82⤵PID:1576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:82⤵PID:3312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:12⤵PID:1840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:12⤵PID:3708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:82⤵PID:3456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:82⤵PID:1428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2824 --field-trial-handle=1816,i,11770311209977612594,17326337761675718860,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\23b58df4-948e-4247-b7e5-61239f4c9318.tmp
Filesize5KB
MD59e1c8df241a655143b01378a97a50cc7
SHA12cf1f998ae14f60c9a5f1c0de36b3327827984c8
SHA256432dfb614db6307c3e00ec4f6cb5f7737e897780d48edc460bc70677f72ee669
SHA512196c1a6b6ae36b96eb883ce606dd569d54c6a9fe9e8ec2fc94414fd6ed475b3894875d1e01119af65810ed58cfdb71e25018484a534eb319e6d5ad100622b152
-
Filesize
1KB
MD54dc61d2013889774899654636e83e5a8
SHA198d13562fac030494ec4ff5a45b1146a49557866
SHA2562bd5698aeaa70506532864f6c80e1983644aebf59cdd71ce564d7855055eab4e
SHA5125cf55ce337eb3b9c78689b1ad587cffa9c41833f872fd6f6472712fc278bcd4776b41408c5a76e088538fb96a4efaf0463e3843375b2a48f8a7c428ef3055244
-
Filesize
539B
MD5ab2f5958eebd77330c750d88ef11d39e
SHA1aacb7749f5db48086af1763373dc525e5da14eaa
SHA2567ad7ddb4e6e170c2066daafc17f1703931b24bf865cb4fa2a518d094bbb88203
SHA512a1b1526c6c99a829796558af93793881f9c478abdf00399c95db6bd77986184ed31459a9eb82f93e20578c937fa3bc1f6779291c059bf38fc764392f2e7a8071
-
Filesize
5KB
MD545a96625ac5d39f16c270f43e839a9ac
SHA179dca7ebb2b7fe5828030086e972a049a20c7bf1
SHA2567e5e6e6aad1cb8283c15a6baa70a765f5c7319bbc7d7f0df8d27abbdb056cd71
SHA512d268954cded3acb1119850cfc970317b728026f0fbce3c34241ad13a828a6d9e1af22c85d8935b672db845312469bcf520f02d850e09250461e91fb6bc9dcfc4
-
Filesize
5KB
MD58a8c38e3d57537a46975abf28640ddd6
SHA1468e2afd9181a6f14405a39a96ba3c69ffa06984
SHA2565b442be81cb25f25c71fde0acb760a79711bafd9373925e77cb572fe3a62f280
SHA5127458d34ee0ccf6e34b740a168a5a07ca319f402c720b0c5dc39252c37cadf22a19bd60f2e09c5d41296b7e181937e8f928a27cff3d99e13c6416d45e96a38cbb
-
Filesize
143KB
MD51e1fe70ff71b22c8902391ad43f5fabd
SHA1dac3f6e94e979654e788faf155f5d99351c5391c
SHA256d91f706f35232d3dc71ec13f1f2562f42432dd8eb2adcb09730f25dc3e7b1644
SHA512f4a74c73d638a06545ffa825d390bdc75cd85c5f624ed0eb8d3547ee5420e2e368461c21a22a61ac4579930db55cfca029c318afa43596de3d5c21c6fa9f2604
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e