Analysis
-
max time kernel
50s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
Invoice document-#INV845167628520.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Invoice document-#INV845167628520.html
Resource
win10v2004-20240426-en
General
-
Target
Invoice document-#INV845167628520.html
-
Size
711B
-
MD5
4cfe983ceb1ec5f9b926c849f83e4cf2
-
SHA1
386b852105917fafe8a52d3263acc4023d472407
-
SHA256
588039bb0b2025b16aa5603ff58c5ec24a59bc8fd0ceb9af65988f152ae9daa9
-
SHA512
80e9eeaed34249cf76933c614f1e087e51dd4488af01e9317775670388537098a5fce3088047753fb818c131ffe99f5223a5dbc3d246981b5b6cbd2c4ea71618
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2180 1852 chrome.exe 28 PID 1852 wrote to memory of 2180 1852 chrome.exe 28 PID 1852 wrote to memory of 2180 1852 chrome.exe 28 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2520 1852 chrome.exe 30 PID 1852 wrote to memory of 2752 1852 chrome.exe 31 PID 1852 wrote to memory of 2752 1852 chrome.exe 31 PID 1852 wrote to memory of 2752 1852 chrome.exe 31 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32 PID 1852 wrote to memory of 2540 1852 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Invoice document-#INV845167628520.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7149758,0x7fef7149768,0x7fef71497782⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:22⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1648 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:22⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 --field-trial-handle=1232,i,14560949742578566315,10194803870731193971,131072 /prefetch:82⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5209f9b00cb1698adf0d795e5e2fee946
SHA1f64bd00f721e0640116b9232605fa340cf76fad4
SHA2569968fad3d7ee8a99b8a5da53ec1a8973a66251081638e7251b958d5d8cea2635
SHA512e9cb9fa52b8da6d8c8b02cc5d781494dbd0191b7e642b817357f28794e4ca8b017df97d94ddcb29edce82b0332d75fa901aa8643391035076cb990b8436c2b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356404bde4d1ba58c79aa8520b0f706a
SHA166731030e9d7cdb09821973f25db864a3f636f58
SHA256498b413161cf192c2677ec366aea4254a08cc10f83e9106fd2415e4d103b3775
SHA512f23dc4e6f61907e6b7bae9e0ae01eaaae69fdc9ded2dc2a056b0983e603e0d1e18f3618c511eca152a8fba8035a1c195398b9444e945d907b3f7fa50187ecab6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5a8e26bebb8a631e26ce79cae1c196de9
SHA12673b9962d6e80acd2efc792f26203335a4792f2
SHA256b5773f9842d8385aa6cf9c179a92096919f8919d359d114c00e7c623e17175f8
SHA5120608f74a9abd1b7286af21f5a0dbeacc3160a462d3971164e5abb316005d3fca7cf2695d90605266bf581bdab986160b209c8d36f0e37c730d6e611c619e01c0
-
Filesize
5KB
MD54caac7053c28826e41f0c919ec90bf7c
SHA196e17fd6ca87d12ef906fef85a1d4390dacc53b8
SHA2563b878ad99200472c5698fc19218320e4019122df855b34b8f4ae698ed1e5d844
SHA512ec0f65109c9849913325d429f4ee0646af4725dea1d1ab598d5696aef47733a2c9053837aeade7a66786bba640a26d7537d8b44343ebf057d9e3d2800515e68c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a