Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 15:29
Behavioral task
behavioral1
Sample
Beer Store Payment_May 23_2023.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
email-html-2.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
email-html-3.html
Resource
win10v2004-20230220-en
General
-
Target
email-html-3.html
-
Size
226B
-
MD5
e1254fc38b078a79966b1b93d2f95c89
-
SHA1
d751e4c5ff33ae08a8db3ff83ec93f8fb7a2a7b7
-
SHA256
ef7849df02650e78f0a9112a7bfb5b2837ee0bc2561825f0a13a0e0259a6eb54
-
SHA512
1f157630dda2b62bd62d318c25d21c2a900209c2915afbdb7295f61232760ed8cc5f48c22c3aeae5e4e7dbe0de83e3116eabe63b10a6aaf1b0ed1426c084edf2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294229773314549" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4836 4124 chrome.exe 83 PID 4124 wrote to memory of 4836 4124 chrome.exe 83 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 4100 4124 chrome.exe 84 PID 4124 wrote to memory of 2812 4124 chrome.exe 85 PID 4124 wrote to memory of 2812 4124 chrome.exe 85 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86 PID 4124 wrote to memory of 4796 4124 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\email-html-3.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84ed29758,0x7ff84ed29768,0x7ff84ed297782⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:22⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:12⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4824 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:82⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=752 --field-trial-handle=1812,i,968873226331544643,3636476707018522363,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD54bfbf3a780c8bb77460f7c2ab6a4baed
SHA1050370d361bb3706067f716afd22196144eaf680
SHA256ff8b4a45f9ce9db3fb1d7331ec62e4410b5d2bc464cd7d48e564f0320ab56ca9
SHA512720cdd358905101ac46968660a64fadc4dfe63913c3242c1052dd64821d92c9f8509a5adc5f8ea332029353f20e4d9c457099f23872faabffd6d6bab4cece743
-
Filesize
6KB
MD598ee4c4bf9ab1068f9656a1ed1de5775
SHA145b14a62dd264d6552d703fe33afada869390c40
SHA2568f3c9862a1679c861d131e359b98b048d33272d70fedd64c58991e8a45e019b5
SHA512bd5d323d85bbeaf5aceda96531612cc8d3527af8b72d7ae5056c3bc7c8afa3aa8e25337b070588c14759a520d6f3ae575c62816671c691007c537db7f09ba8f7
-
Filesize
6KB
MD5124f4b624e24cae658ed2beffbc73867
SHA176fe5c22966a53639a30ce5fdb40c958b1557567
SHA256fc1bc49ae2425920cf9afedadbc263423348392086b401597e18b00fe8dfb180
SHA5123088da4539ec509f17f87ca4f0e011de8a81b50545b3bb48ec84a33af2189b5f1635835b8e2a48e2edd003053bc6d31f2086a54d3db7d5f289a5ddf4205c88cf
-
Filesize
15KB
MD5c57139ef3548f9883d9ebd4712812ac8
SHA12c206da8486b7171a8512e235c45cb9ed3c48f09
SHA256fadfa1da6df5feb7f6f96c2ed705e6c79aa1ae23f8a156c205640ef8dae94dcf
SHA512c2ebaf1a814ecf0291b65e352b7ad8300181b822960f2c5d5a2b5e8bf62f2563ff294c77eca2481a2d35f92b23d51e5bbe0bab366decb2f93bf1be62ef179b14
-
Filesize
152KB
MD5d438930d6c04589a57d51ffd808c1b49
SHA10c0f328ec12b8fe8024105962e3488d851c74818
SHA256930f884cb2685c141a3291ed311de0cc54f5208b24c958ff4273696aaad82eb4
SHA512559d6755bb5f99387256bd0af323608db7bd16fee4970babe887d6ece84c40c5f56c5378d681615e6338eedd1ed3579021dae4545653ee450d0ba65c0c22dcc9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd