Analysis
-
max time kernel
299s -
max time network
251s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
15/08/2023, 11:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.clientpay.com/home/payment/#/paymentPage/fb63a132-6df9-4267-ad67-14c4c4d18c2e
Resource
win10-20230703-en
General
-
Target
https://app.clientpay.com/home/payment/#/paymentPage/fb63a132-6df9-4267-ad67-14c4c4d18c2e
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133365741027677634" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeCreatePagefilePrivilege 1332 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4872 1332 chrome.exe 51 PID 1332 wrote to memory of 4872 1332 chrome.exe 51 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 1340 1332 chrome.exe 73 PID 1332 wrote to memory of 2084 1332 chrome.exe 72 PID 1332 wrote to memory of 2084 1332 chrome.exe 72 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74 PID 1332 wrote to memory of 2056 1332 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.clientpay.com/home/payment/#/paymentPage/fb63a132-6df9-4267-ad67-14c4c4d18c2e1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe0a899758,0x7ffe0a899768,0x7ffe0a8997782⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:22⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4796 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1760,i,394531799711426211,3719368878941041565,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52a9c0a1074358185eeb6b70954ebdfe9
SHA1c944e4dc2d1c703937ba0c9ada25927bb3373983
SHA2564dadc11ec68efc62c2ec5fdddca582d3f3bc413b85351b5d3d7285cf8d2f0cd4
SHA51229c9d5895fcbdcb5999a40a5068d378b86c50a2ccda983049dcf5b9a184fb2d1162fa0a7225f1a6ae07b993fa4d251f6aefe5df008c055fe1c2fc859c135b339
-
Filesize
312B
MD5025e0e3a2a454282d5160ebb0f774317
SHA10afd6bb9d6ad52b9b3119e08833059394e17ec39
SHA256d378ee791057d8a3dd4e76622bce6fc3189a697943c7e4c110df973347aadca7
SHA51275809b0948137b0a887b67d0f32eab314af49bb6d1e1e8ba3054afea258c3c2d6dfccf6784f4cfc88a1926e00d2951b8c0aa7e1ea434497b83379d571d1f1bc3
-
Filesize
1KB
MD54b4fa209dd18966639bc94a6b922cfa2
SHA187fcc2fdace9d390a56e58f3b981b2c7cd6ed625
SHA256dd3097800ce5ead5cc68413078670a6d8ca39d889744b750545ffb0c1ad5f7f3
SHA512105de4978df7f82132407f467b0af92ece8c742bcac94db048871c378f6f24473313bcf2b0928862f4255eca13b04896f840481bbc5af616fb613ee2ea48b1ef
-
Filesize
1KB
MD5e9888768be53fe1fb7782e3a897b2367
SHA1d7ef35b35ca37fa200d22194cb6d4d0bdb263a69
SHA25679e903027eec2b2f8d551cb0f60a3a18afca7cc15be1fffebdfd1e9913c97c8d
SHA512e2c437f5fada7e6a273e63510a904581f991613de7a621d0a3ecbe765bb145ef1c34b53b56d3b7f2b441a16bc6ff402bde9973137d74395b784f43fde617eb17
-
Filesize
1KB
MD560a8902f03d7973e4144553674d19edd
SHA1c037e89312ad1301976b8301e21384e6f102d032
SHA256e3c10c02b7c3d9b8d4155696d861c6857ffe57b490cb54ecef08e1129b0b536a
SHA512d99bb20f1e2ef77f108e4138ca1cca01084f2cc55222fa7971a4e8f5af25235c7f410db0d51b68c224129d079c7ca8c07b8229c8eea562075412609146888c54
-
Filesize
537B
MD58ca05aa0a3d222ea32954d4300dc2ef8
SHA1edd9de2dc206ffbbd82003d3e0d459a5d2a9bba9
SHA2560ee1e322c71dd9d55c8596c411380eb451845622c00708af1beefa13c028def1
SHA512c25d66f3dcfaedc598db4c01be9b414cca644551901abb7ecf737c1c2cbc7eced6155a507703a1aafd9b3f649fd603405f3766634911758acfe8bfd4746c7fb6
-
Filesize
537B
MD59b888d4e8e29a04ec7721f2f8fcf55d6
SHA1eb19970f08142c0f23a13ade3817c8092c3e0e9b
SHA256785c3197b162719fbd59fa7760031c748218588e95684ed1c0923acb2a83df9d
SHA512efeb9fc2841b8fc755189f105e0e2d35e96e3f1d24b0e3497b91d4fc188c6d55a987e0dc64260e391e4867dd6572a8ab7cde58f1c7c064f851b2abb0ccb584db
-
Filesize
6KB
MD56030eff5827dde030dca31c1e9e2c629
SHA1e4cf667db2a9e7376316b260d4a2b744284956ee
SHA2569329b9da1468e34fc51c085f686d489794c8ee8e48dd91899359270e3a2c5bce
SHA5128f0cc421d50056da318ef7a8e323314c417a7a6ae31d731023641a111cf2dc8db265399b26cef4230a1ef871922da48e4bce69f4012c41f1f5d1412456f11696
-
Filesize
6KB
MD522a0e5a22f2e21f7c72039642b0e2d49
SHA1a3d0e609894199b9b5a8913bdf075e2caa0ee1eb
SHA2561eb4b2c97ecb57d3f115fecc370646abe9d834f8e687ffb36978aa2815e2bf74
SHA5120ad431a2473a3d40daee1cf78991c37b87b417af8558d37f76ff22653005fdd8b69884a10ec574a62e663f945bae17835867eff6b40234651e5eefd4a03080df
-
Filesize
6KB
MD5b36d3d435f8e9e13d6c4dc249e9bd0f8
SHA133fb81110b3a45e6bc5018459b1d5bc463f5c108
SHA256dd1a05839bd18acc0253208a0da70fb2f5797e7226062999f3035f8e3c18d24d
SHA5124f27484e9e75239fea010413bb12d01de88b6c1519efe469b6f7f0f4c00f0476e8204c08bc8cf7e20dba680b05a4b8d4129ee80cbbc3223e5d5b35088f795c4c
-
Filesize
87KB
MD54fe1f80ea56fb29c50123413a117801d
SHA13f14310d2a6462eb4d2efd0b85cb37e41f838f50
SHA2564d8285bccc6d39d9c7f2a57772d143a4f655bd0b70896c9ab9dcf056906dfe9b
SHA512c8d67545ec49d5caf3f7a535562a2258646c3ccd33e990c3cdbf1f75904df0b3045c77f9c36c9883e145c6953d5a5e83de11470e911106dd1d53ee93cc8a4f13
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd