Analysis
-
max time kernel
136s -
max time network
538s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE - SAETHER_20230704.html
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
INVOICE - SAETHER_20230704.html
Resource
win10v2004-20230621-en
General
-
Target
INVOICE - SAETHER_20230704.html
-
Size
2KB
-
MD5
3a56e44f3d0f60a869ca738ed44fb51f
-
SHA1
a2a824efe9dabddbad879d97dfbffdc05fd6b7dd
-
SHA256
3d4a87e6b7fe5d3db1c87e1e00a9799afdf0e5a2ebc420b6aa938443fbe87480
-
SHA512
2a50318add30262fcc3de83dc58c62c63edba3e4d2e7be7480b92acf820ddbd640663bcd663db5e2665e9431ba60198dcd2b1777a289e2cae0d49d5ddcff680b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1040 2992 chrome.exe 27 PID 2992 wrote to memory of 1040 2992 chrome.exe 27 PID 2992 wrote to memory of 1040 2992 chrome.exe 27 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 840 2992 chrome.exe 29 PID 2992 wrote to memory of 1748 2992 chrome.exe 30 PID 2992 wrote to memory of 1748 2992 chrome.exe 30 PID 2992 wrote to memory of 1748 2992 chrome.exe 30 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31 PID 2992 wrote to memory of 2348 2992 chrome.exe 31
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\INVOICE - SAETHER_20230704.html"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb299758,0x7fefb299768,0x7fefb2997782⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:22⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1144 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:22⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1036 --field-trial-handle=1296,i,9771827312554019503,389526519883239360,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548386756129becfb1f590f268fccd79b
SHA1557c08a3294344121080de23ddbb2d462cdde78a
SHA256a694100163010014f38d00d6baa8db2d5f721bdbeb1e3fdea30deff17c59901d
SHA512624ab4a832f4b0f0f74ef962b118af8cff5eecddd10caf00efbe488872b1f2cd42b30482c51ab3772b005d1cac15252adeac6ab6a8103c5888a133f48b0b6f19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6ef50a.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD502330338b278c60ea95abea05f2817b8
SHA1cf3a295897baf1a5c2eac7a97f303c66c94354b9
SHA2565b91d3ed87ba5dd6e09ff7120a6bdeed7d8b655e5f8782ea31322ef75f179613
SHA512e4f13274abf0ccd284ed3f86df1bc014f3d5f74dfb34a72ef69307a9a8665a96b43f43cbc929dbd2e1bdcfe906c79d4cac7c0f5e929f3e003b4bbbecf20ca7b7
-
Filesize
4KB
MD54ab7c899943663f4a745902f7b23e5d5
SHA1c3ab945444dc2617e8dc016bacc32ca200ea2bff
SHA2567b656b885b7e0b7c89ef7a0c18f85e5a64506265a4e710eb14ea2c38f6f29adb
SHA512e302c61eb752fbb52b40343274f6e00f5679a57de7938aab10c9cdf613eb20936b8f68a769fbdf2e8c0505596af88e963c0e2ee1df38e5b567976ef70bb53294
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27