Analysis
-
max time kernel
43s -
max time network
34s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-11-2024 23:32
Static task
static1
General
-
Target
Transaction_Verification_erik.aasberg_DXQU64QF0K.html
-
Size
3KB
-
MD5
222aa64edfa5bccfd87ccd1f0106c63e
-
SHA1
c5cdb3a3239a122b6a01b8731739ad4039d25cfc
-
SHA256
41d9bf6fc07d9109a0eae88c192b921e540d73e01b40f180e294d0730a4b2a37
-
SHA512
8a3f0567a4f79084a0542f54bc6bb84b979fa2b37b99853f5841e04dc1ea99dfa11f1ca3b3f2b045936f9f41d9b27a60266c29e75a97e8752cc278bac08d708d
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766192034330049" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 chrome.exe 2160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4520 2160 chrome.exe 81 PID 2160 wrote to memory of 4520 2160 chrome.exe 81 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4528 2160 chrome.exe 82 PID 2160 wrote to memory of 4408 2160 chrome.exe 83 PID 2160 wrote to memory of 4408 2160 chrome.exe 83 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84 PID 2160 wrote to memory of 2144 2160 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Transaction_Verification_erik.aasberg_DXQU64QF0K.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffa1412cc40,0x7ffa1412cc4c,0x7ffa1412cc582⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2068,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4640,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4716,i,3572895953557652620,15707989126267923331,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58261a41c584ab6ba0699fa93d3d44aff
SHA166322a1ada3c6df119012f53642951e11a2caaa0
SHA256ab27b27a96e04f958f9a237456c8df988c8acd09f890da232fcc99ec73f1ce21
SHA512455c6e1379828f7b07f2e3e99224557ce20c1813b25e0cd42c425627b863234ab9a0887e612bfe8f2de2cb6fd0d00ca2b368e3006770f924fb62fa3bf51ab325
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD525029575f8e7f6eb4a25ac3dd8af81b4
SHA1cee054ab8504d8795f0445a573481992b4638335
SHA256a313d121c56824078b11cc6ff56a1d4e58351b44b7b474635148660fe35fc838
SHA5127d77e6e2c7bf0fb112167df80ad655ba1134012582d6bc7a19872afadd1ac884070d73d46536754639a258bc219c6ebe6f2175dcfc84599cc2b7bdf6db04f3c2
-
Filesize
9KB
MD56239ff5202644e8ca48d6b38bf9fab6c
SHA14d7c435fa281b9f5344f027f245eed9e8a11bb77
SHA256e9207dca4450de118c3a0ba31a8d7d4c7a5c74ff945b6d82641cfc4f06606fe1
SHA512d1fa8681a6acc9ce3a3b6f0f98173eab90542429752510d4d631f90062e595837bd50de7eb1a63c8e3c262d19bdb91c5ebe95e59f911465cadb811e4fff5eac8
-
Filesize
9KB
MD58f55080208c75b84d73709daef462c70
SHA1b9ef59c7a3303c01fcff892c89c5bc747941aead
SHA25602d28639dadae9abe6b61fe996b5a452fe139ba0cf96f4b3ed3d3671fc573cf3
SHA512af87aebf302c20ac6fdd5f369180e680387bd932acd61a7ea3fb49cf835f0b5058ebec1e42323c81fd45a9b961cb09de8801f3486ceb2c9024699c87f8ff7cd8
-
Filesize
9KB
MD5010137fb0be672af622679ba1ce10eca
SHA13ca71797eb9b024764307f0d99bdbdbc274cd0be
SHA25641a1ef734181548a7ebefa7d41b43752f97a1a3a8aa575855857288dd4edfbd3
SHA5125118443df74eeb5227aaca5a82eb6dee6cd97c6b3462fc63ba1ecd7e483311ff59ce545405c7632e0145b0731577ebaafa31323da85bca08267ed3cdd9a010c4
-
Filesize
118KB
MD509d512083fe73a728191ea25da44a567
SHA1b2ff8b43cb5e887dedc7427d4399f541f5741f77
SHA2567acfa411dbb7528bbf2fcd78ab2b99b8208c2b7f280b67e6bc64bf67a586251a
SHA512ecca273a9c6a239a885fc2e831c42b1ed7d863b7e3c2dca44c3512e59fb117db14aad9b93db4a77edfe3f044e06a2df70ecb912197af60a1c750675fea348408
-
Filesize
118KB
MD5bbd62afd3db7d281830eaf62a8712c9d
SHA13f79f727375403ca0d40d9d36c31145c61fab671
SHA25665b9b1c9c0ad04d4a8b069f4a1831dcc9ff86971777be74a2c3a9f6e031f2b3b
SHA51241991efaf40f9ad658c4e15c53654df37a79a5a8b52d7c216e982df91cdf5d573cc1a832a0b918740959da454f6bc4ee7ffdd25c5a6729a888948e6dc9179fae