Analysis
-
max time kernel
299s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
20/11/2023, 18:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://amazon.coupahost.com/supplier_order_headers/view_po_via_email/d926d51489be2c0ad4e65e7cc16e1ada43cea025
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
https://amazon.coupahost.com/supplier_order_headers/view_po_via_email/d926d51489be2c0ad4e65e7cc16e1ada43cea025
Resource
win10-20231025-en
General
-
Target
https://amazon.coupahost.com/supplier_order_headers/view_po_via_email/d926d51489be2c0ad4e65e7cc16e1ada43cea025
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449775693429155" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 672 chrome.exe 672 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 672 chrome.exe 672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 1812 672 chrome.exe 71 PID 672 wrote to memory of 1812 672 chrome.exe 71 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 2104 672 chrome.exe 74 PID 672 wrote to memory of 4572 672 chrome.exe 73 PID 672 wrote to memory of 4572 672 chrome.exe 73 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75 PID 672 wrote to memory of 1076 672 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://amazon.coupahost.com/supplier_order_headers/view_po_via_email/d926d51489be2c0ad4e65e7cc16e1ada43cea0251⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff991109758,0x7ff991109768,0x7ff9911097782⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:22⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4308 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 --field-trial-handle=1756,i,2012632659873471400,1270334064913486215,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5710f55d822ac8e1b131148b43c7833ef
SHA16dafd2b55e0e6c9880c74c222f73eeb67aab798f
SHA2562f75f23cbaca0bd3dda1ca1d2578439f58b3074ff403cd45e746223a41552148
SHA512076710fd13f599101657dc1ea57511077f46435f7b42776fd4dd5274a70a726974424c052a0f4244338295440369054d2deef041fc866b8b4b2d1079db415fb8
-
Filesize
1KB
MD5d999957683a3263534b174ffdd6ef01d
SHA112b7de7026e2ac7e382524325f06f480b33fc7c7
SHA256b542f30ef9d869ca2f685339b3b6b53e6162363cd4a6f69438faca28d895505a
SHA5121435a07b39df5df274fd9d961c5fcd73daabbb1961aa14ee65b5f59c40a351ca70d81084710ec308ac95048fd85f95f254ca93763fd9810bb032061729c5f5e0
-
Filesize
706B
MD56868904398341e4802f0d957dc36c88a
SHA1c58d8ff35d9533c994cff9a109faac66c72aa19e
SHA256f72e50d947a9f156a3664e34f257cb33b8caa156af89b1472dc574f2d1dd5d59
SHA5128dfee745304c0b916a5925d26d99701e80ee1d3f0059460d40e5b80774839e7f665a59578565c8a4d71b1a5ca46ba2e133adf3dc51c142f3015427284b2dbe5d
-
Filesize
5KB
MD57596de347c9f366546b8db1e2c263934
SHA1069bd939daefe707cc3d7bf414bffd93d5cf23b5
SHA256d185a848f695434e274a008f345e64c8aaf487b0858de484a5763bdb96257511
SHA512129fe92f15cc7041053082223726d940beb18d367606551ead455bab9b851116e5828f3195ae329015c32d1340abb0b3059d096d220994d5e531be108afce978
-
Filesize
5KB
MD5cc5c9b911ce2fa69646e5eec34128a42
SHA145d08b7b766988d86a6a1e18c14ef709010df810
SHA256c54c82a761b4beee7b23acb535644f17632dee0842afa9b1d8bb8fb74e38fb69
SHA512832c0243834e917808dad878dbf03c441b988e39cbcc0f2f1126aa4854129aba6ba39c672c323dc1588a0bb4eb08f3cd51e320a45b7f7657ea9f0baa009b377d
-
Filesize
6KB
MD511f02f88ba734ff1d96ea2dd4f838638
SHA18c4a327972740c9e29d9bcd145bb7e215ba45281
SHA256d1036682ccea0e451a5befea728646da388fced4dffee7cba5102ab905b22ef2
SHA5123f86961e9fd190aef784002884d781716fca0f8c44f06e0f332db92b74a42a065b0f31eddd47f4168bd531ae830de621fe2d9004cc3f821dadfa6f6e91db4b1c
-
Filesize
109KB
MD537f92cf53002ef75a870e69c786d4d71
SHA1b8edef50f63e7b0ddded9aa814ceffd8893dc271
SHA2560bec3d548a518eb81f153c21213ffebdeb46a10a2bf12ae2ce98fce9faed7019
SHA51231e4e043d48ff9062fcc92d8d2193367e4f74af7ff9b07fba67518ef7172c1032a4bdb947dd88d211e37fe1f7feb4f4bd7c2cf95b8a2becad9c08cd069afa55d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd