Analysis
-
max time kernel
22s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
️payslip.html
Resource
win10v2004-20230703-en
General
-
Target
️payslip.html
-
Size
2KB
-
MD5
840352ed8f857df924cfdc4e544022f2
-
SHA1
f6af3d030360ec70efde035903ff5871cb47e451
-
SHA256
d66f22f2b07f5ad613964b6ceb1a42118bde109946dce5cca00230539c976526
-
SHA512
ecbfe1482f2571d4c1e0851463b6d7db4da06033a051cd5b5f8f5a620879c69a4af099914760bd74af07a64e81df705391d3197317b464b0a4ef8daa161ec2a0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337137130854364" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4816 4284 chrome.exe 85 PID 4284 wrote to memory of 4816 4284 chrome.exe 85 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4308 4284 chrome.exe 88 PID 4284 wrote to memory of 4092 4284 chrome.exe 90 PID 4284 wrote to memory of 4092 4284 chrome.exe 90 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89 PID 4284 wrote to memory of 644 4284 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\️payslip.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb92949758,0x7ffb92949768,0x7ffb929497782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:22⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5188 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1876,i,11344830573153795237,10709124277186906203,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5965929f1d25ae2b17448de3b2e7e755d
SHA1c3dce7d0bd43dad1e39c817009ba2e92ceb9b1bd
SHA256f3677f86b76d1d3ef2c4caf71b35a75226c836e7a0a8d6d814c93d78ad74b5cf
SHA5124145e64326013212508d92514554c1816e2d2c21bde188fa4119e7ab7ad55327db2a8a4d569c385841ac87fcbf6d32b0f618342990b4962b95a657fce5d02c0d
-
Filesize
6KB
MD5e6155dad1405c8e3825804d1155d8efc
SHA1a01bb4a7af2db8057ecf13838acea2791bc00249
SHA2564d3e813cfefdb5759d92c740c0411fa911d9ef254c51a1a379376fa13d84f490
SHA5122eebaa47e5f24a778592c54fd0dac1bc58330373d5053438d766783fff96f0aa5a2bcad3d40e6b0e826f74d2636cd51c6dd23867f522e995c460c3ced0e735bd
-
Filesize
15KB
MD5d16c81474de2e19c23b2982af8de4240
SHA1f6851b4c88baeb898f5e59fb9f088f4a41bb8987
SHA256568f68afda18b8c78d0600315baece13b9e08aae98016f4806b683deefe46a2a
SHA512e7c4042fc06f8430147dd4b9c72e6258f65bbb11962088c7ce56b764333a610eb51082a468e55314a63df44909be1ad464552efda40f69559ef2c17987e08de8
-
Filesize
173KB
MD59c92d5ab5d4ef78f27cabc522b576dd9
SHA14007bb6c9c3d437e3fe00f909b850f9c28e6f92c
SHA2564998d069322e3b7c0c81bdb80d6ac4a6366d9c90a9aecd649a678db2af19ed54
SHA512cd61a2b12b6327e7b1b99b58d3916a232ea103662af88188a38ee7fa425116b9ce443f57e312cdefc2df18df1d8baa3fe9f85dd88872eabf8d75f81bfd931b91
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd