Analysis
-
max time kernel
90s -
max time network
79s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/04/2024, 20:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/7fjdalcczafkhj1/paysafecard_generator.zip/file
Resource
win11-20240412-en
General
-
Target
https://www.mediafire.com/file/7fjdalcczafkhj1/paysafecard_generator.zip/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585499808002474" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1504 1740 chrome.exe 77 PID 1740 wrote to memory of 1504 1740 chrome.exe 77 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 2124 1740 chrome.exe 78 PID 1740 wrote to memory of 5044 1740 chrome.exe 79 PID 1740 wrote to memory of 5044 1740 chrome.exe 79 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80 PID 1740 wrote to memory of 248 1740 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/7fjdalcczafkhj1/paysafecard_generator.zip/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe8fd9ab58,0x7ffe8fd9ab68,0x7ffe8fd9ab782⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:22⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:82⤵PID:248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4268 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1824,i,3039493859266861761,9856380048191738559,131072 /prefetch:82⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512fa53d48805bc09c1aeae71eb4ea328
SHA118f23b06eac20045640ba79c66537db5aeb92d60
SHA2565a56672663faa0e3dbe234f702b93fc7389db846444504ccf382d50c50a02223
SHA5128ea0a984785a4cd5138485cd23ec74e8f1a457de478503a6d042c7ed8e19cb1073c895dc9877704f458aad9802072c16e43336189f937b67ef59c08ef80a08b6
-
Filesize
7KB
MD5a56ac9987f56d45fc4626690d5b91aa6
SHA197cf472dae3a272729844988aacafe3ed883cb86
SHA2565aee824a1951575c74ff72055822b0675c568c2f651db9988b2d1da95914f0d4
SHA512496a1874f6f8c6f069b67ec3009556a063f216922cfdccd9d42bc226c0fca9f96151e22602d8ad6bc283fa0922eef5544f24d5802b366c607d916d2fcad58a91
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5283d09af1d97acd4979b1be6bcde6c34
SHA1ce45a47f430d12a554821fa18f14945d06b35f5f
SHA2564c564a0a6ba1c17bc49954c2b1043b5264bea916d630b17228be0e2a4f95807b
SHA5121088d1379de704ee5fe61a57af89c377eb77e584261323dc4c6c850d01fd94a2bf91d28354ba9e3f9a5a36b940e53704085f630810051e1a5a1942fbbf1123d1
-
Filesize
7KB
MD5ef2b7bf7904dfd279e24786aa1edc6bc
SHA1a3555b2014cd6937435a764bc585d3f04ab7179b
SHA256138c0967f6706d13e4d6a2fda9ee160ad9baf4fcd8c6832cfae4384ff23cb592
SHA51216d389b6f64e77d369eed38240b1d501374f6572131b7af5eee3d988fe866117796ebc0d9874280c9ded1ccf41519fad728db875f82c1c0d66bd7a88a7bb6fd4
-
Filesize
127KB
MD5fc8ab1f5837c22310195624be4a287ad
SHA1f3043a4cb8e41527067db182225e9b4f8e50bc39
SHA2568e5a063ce7a7c9e876dafea5727b7b182b741d5836f722e2ec9c73ed66b49cab
SHA51258954a7b4955e73e1ea9a0c63da8830dd9e464525b35b280d52bd5a5d589e9191609fcee991bc8ad19723b667ffde624f7cb7b5112380b26ae4534e9e800c690