Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
ELECTRONIC-_RECEIPT_Macktrucks.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ELECTRONIC-_RECEIPT_Macktrucks.html
Resource
win10v2004-20240226-en
General
-
Target
ELECTRONIC-_RECEIPT_Macktrucks.html
-
Size
494B
-
MD5
9dd2effafc305df67c6524e34a8235cd
-
SHA1
53c60db321f812b0a21a86aaa8fd433fba23439b
-
SHA256
4c05dfb6facba9268d0b05b7ce7a6ba545fe1f53bf82d94e99b7a54b8a3bc50d
-
SHA512
975f239e6fc98a345cd08b757f8636ead8b1f6efbe6425d29c2282b0eb8f31edb0f99ebfc4db73d2aeb0c2b56af4a463e62cf4c6d4fe0b0da9a4f14c595a3e9d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608935437985652" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4948 chrome.exe 4948 chrome.exe 3516 chrome.exe 3516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4948 chrome.exe 4948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4948 wrote to memory of 4248 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 4248 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5116 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 1176 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 1176 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe PID 4948 wrote to memory of 5052 4948 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\ELECTRONIC-_RECEIPT_Macktrucks.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eb3b9758,0x7ff9eb3b9768,0x7ff9eb3b97782⤵PID:4248
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:22⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:82⤵PID:1176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:82⤵PID:5052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:12⤵PID:2492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:12⤵PID:4864
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:82⤵PID:2440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4476 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:82⤵PID:3752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2448 --field-trial-handle=1880,i,13577693060924679668,10132536107774707505,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51d283936fcdca7e689874837683b439a
SHA178445bfb7fd7e2b7be4bf150cb766c6648a14d97
SHA2568b61af1adb5803723bc9f16796ba6575e09064861efeae4982db8b66245f10b6
SHA512987246a8b4382bcfa68f44c6f21489a5ace9d6ed900453a454e8c5cae7cd5b83c20e9360b261d9dd77cef49e0856f3ba33b100eb2d03683fc065dc6b6653f374
-
Filesize
5KB
MD53a530afb1ebe0a0e759da9cb227c5530
SHA191187aa18eff6608a830cf2d61d1ad6401d8c2e8
SHA256526c28d1186af7fb663f2c9a9f501357da0860fc8c98f02fe7a290e1393f8ab8
SHA5129ec2076289d7f5c0fe5208721b9f5a82a60b85176f56e2da0b0f92675910ceb9413a0524642d610ef889098e9f06f516267f1209a4188bff69714d7136a2eab6
-
Filesize
5KB
MD541cfe9795e7bd7746d5f891498f027d3
SHA123a5ee4c89ed7f404d948ed3c2a108127cd2f319
SHA2566feba30d4fa85c7d73dd4d5cd73e0d17294813a10ebabed13d29999d08d149ec
SHA512a5d544fbaae64dc73272958f8f6976a65fc9ab29809b66525a94cc6fd3f8943124b4df9eadd66258585342f502b8b2e9c85ccc229d966b136da15b585f4467db
-
Filesize
128KB
MD5a007752566609169ad1d41e05d33dc96
SHA1a3a6287a3e776c1edb11e62affae9b98377288bd
SHA256e5f95a05f987578c93e4069cd9946cf2b716663e1d8b56f51805e136c33d6820
SHA51230c19632e798c305b06b15ff89a1d67f254a375e0edde41fde595edee2508a9e56470f22b79766eccf45b3f44e58fb94d044e2e58a46b82296a9b3af8f5adbe4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e