Analysis
-
max time kernel
32s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 16:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.replies.achieveyourfinancialgoal.com/c/eJxMkM1u3CAUhZ_G7LAwXMAsWFRJJlGlqqpUzbSr6BouHTSM7WLy16evnNVszznftzjhOUd_fzy008O9md0pX07vT6Z--8GiDxpNUIz8YEZwICxYRlfM5bl9rOTflnpJZXm7yXaZGJNQo5E8xUlxSAq5i6C4gITGhMEZirfI1mjdOYoQwIDgCRxwcDJxp7TlyahpoilZax07-2htFGDCpGxKGgETKgxaTxBkGgSx7KWQSmgJgxYabB_iEMM4phjB0jDEDkSltWTaegznTK_0sbzUlGecQ8byZ8HSh-XKij-3tm6d-tLJQycPJc-XfqLWqOJLW67YaN_tTScPf18f7-r2dW5HVpbPV9XD-Pj--9dV_1Rg1FF_x7snVn0417w17Dcs-K8DsWEOu-d_AAAA__9hkX3R
Resource
win10v2004-20230220-en
General
-
Target
https://email.replies.achieveyourfinancialgoal.com/c/eJxMkM1u3CAUhZ_G7LAwXMAsWFRJJlGlqqpUzbSr6BouHTSM7WLy16evnNVszznftzjhOUd_fzy008O9md0pX07vT6Z--8GiDxpNUIz8YEZwICxYRlfM5bl9rOTflnpJZXm7yXaZGJNQo5E8xUlxSAq5i6C4gITGhMEZirfI1mjdOYoQwIDgCRxwcDJxp7TlyahpoilZax07-2htFGDCpGxKGgETKgxaTxBkGgSx7KWQSmgJgxYabB_iEMM4phjB0jDEDkSltWTaegznTK_0sbzUlGecQ8byZ8HSh-XKij-3tm6d-tLJQycPJc-XfqLWqOJLW67YaN_tTScPf18f7-r2dW5HVpbPV9XD-Pj--9dV_1Rg1FF_x7snVn0417w17Dcs-K8DsWEOu-d_AAAA__9hkX3R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294277226878543" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1500 chrome.exe 1500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1500 chrome.exe 1500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1500 wrote to memory of 220 1500 chrome.exe 84 PID 1500 wrote to memory of 220 1500 chrome.exe 84 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 2080 1500 chrome.exe 85 PID 1500 wrote to memory of 4188 1500 chrome.exe 86 PID 1500 wrote to memory of 4188 1500 chrome.exe 86 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87 PID 1500 wrote to memory of 3932 1500 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://email.replies.achieveyourfinancialgoal.com/c/eJxMkM1u3CAUhZ_G7LAwXMAsWFRJJlGlqqpUzbSr6BouHTSM7WLy16evnNVszznftzjhOUd_fzy008O9md0pX07vT6Z--8GiDxpNUIz8YEZwICxYRlfM5bl9rOTflnpJZXm7yXaZGJNQo5E8xUlxSAq5i6C4gITGhMEZirfI1mjdOYoQwIDgCRxwcDJxp7TlyahpoilZax07-2htFGDCpGxKGgETKgxaTxBkGgSx7KWQSmgJgxYabB_iEMM4phjB0jDEDkSltWTaegznTK_0sbzUlGecQ8byZ8HSh-XKij-3tm6d-tLJQycPJc-XfqLWqOJLW67YaN_tTScPf18f7-r2dW5HVpbPV9XD-Pj--9dV_1Rg1FF_x7snVn0417w17Dcs-K8DsWEOu-d_AAAA__9hkX3R1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92b009758,0x7ff92b009768,0x7ff92b0097782⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:22⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1848,i,4804714489095593767,9671114430480135917,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5144dc4ed6c6bbda22ac1428e54f1aa6d
SHA147266316e003ea7fde4f2652b634f98367b4c9c4
SHA2569b725c5dca2a106b47267f4be075ceb57d948984cd157ebeab5f42bd0cc92ef3
SHA5127bd7a09125b3bebab2af2d088161371b1bf6653b06223557716b7bf88a8ea96f793adaf725e5b4b7d32667bde637966732ddfbd90d1c996b119bbc53c22d6b3d
-
Filesize
4KB
MD5a4fcb68c0c81a32863f49d41af1a4e24
SHA1bab718878e6f1f387ac1b19d4a2a947852cccc29
SHA25664cfccab6ef311ff5657a2e020b3c06d891a810512e1a98b69f9149a7393686c
SHA5123e27fcdd20dd1b2f2df9de375fca8965af1354772a248695fd2c383d386fafda38ff4e11fee783c6afa3af2156946eb0bf44c176876995e6f100cdad3b0ec9d2
-
Filesize
152KB
MD54e0d4f95a68b2937619de1ba87aee0f7
SHA1d80eadcfaaa3aae77b23f899fb1291ecf3e16948
SHA256231ee8429fd8e241da5fc28794fddde237b5797602ba5813526e95a84527a8ef
SHA5125dbbb88cc2307465189f66618726f583b6167016d0e7aabe806f43a3a9c589ae71703dd945453e6df4602542421c2b7210b82ae6790a12cd47f547c86c645395