Analysis
-
max time kernel
59s -
max time network
56s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/06/2024, 06:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://paysafe.newsweaver.com/cq5ua6uhpo/8sxkfjxj4f023dhzrh3t5l/external?email=true&i=2&a=5&p=9882940&t=3453273
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
https://paysafe.newsweaver.com/cq5ua6uhpo/8sxkfjxj4f023dhzrh3t5l/external?email=true&i=2&a=5&p=9882940&t=3453273
Resource
win11-20240508-en
General
-
Target
https://paysafe.newsweaver.com/cq5ua6uhpo/8sxkfjxj4f023dhzrh3t5l/external?email=true&i=2&a=5&p=9882940&t=3453273
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640284364166120" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 chrome.exe 224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1048 224 chrome.exe 77 PID 224 wrote to memory of 1048 224 chrome.exe 77 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 4268 224 chrome.exe 78 PID 224 wrote to memory of 1388 224 chrome.exe 79 PID 224 wrote to memory of 1388 224 chrome.exe 79 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80 PID 224 wrote to memory of 3904 224 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://paysafe.newsweaver.com/cq5ua6uhpo/8sxkfjxj4f023dhzrh3t5l/external?email=true&i=2&a=5&p=9882940&t=34532731⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff8f68ab58,0x7fff8f68ab68,0x7fff8f68ab782⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:22⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2124 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4132 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4412 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1812,i,4883713866632741593,4194714226123119445,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c5a51673f47fd31990994107ded6e6cf
SHA1636556699ae25e13b06743aada17f729927f9dd3
SHA256ef91ad8e5bb176fef461dc3d5c3f4192e7497af88333907b676dd55e9b284c20
SHA5122ffc3335029626aa37a4f444fb70f7cc28f15bfe3fb41ce834ac4ec9f28b66e019150b151f48474bf078d4c50db89037042230c4079a9394b61e5803fddbcabc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5fd11d43b2c82f91e62da838e3c081fab
SHA16b933d9c1347bdcd31123e8893ee29a1cd48691d
SHA2569963c31b062db45d696298801270da8f8fe8b49da907eb02fdd8c5653405d686
SHA5128db89f83a3e287e47adb7b2ebb96a6ca01cd6bd00eb98b80e215612bfc5fbd71e2a71168160558023bf1e5b3676d342c9214654ada46e5dc87520981e2c8953d
-
Filesize
7KB
MD54950cb919598170330fe54ac0437f6b8
SHA1d42e9c62686c38a76e6a5295c3584eabaa374f4d
SHA256bcad997b98519c18b0c252e9b1586be828dcf4ee4347ac193a5721bfc3875358
SHA51228fde5fdf579e6f184c29a032a7b0403caeb0dba12e06d5b9ef78e38f134f271fef9b912fcb641610c0e7d8244a2eeb8f3afcff8c9a650c61b88874ddbf483a9
-
Filesize
129KB
MD566354f7a4eddb1f2b8c0a5210d204c4d
SHA196624544c9d408748dd13c63033febd4e19e4406
SHA25686ac992532bf55d32ee823fa7af8e180c696bab8a9ae0d4ebb979612de014c9e
SHA512371b2a6c2f1561bc4b23da8d73550ff8124b2ba191d1d993a204d4e479c91787e55ad0f76e06481c74af0d926251d141cdb22925b047eb1e57342486c91bd3a3