Analysis
-
max time kernel
29s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 18:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/invoice/payerView/details/INV2-3NZM-URG4-ZW67-RD2B?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&calc=266de826e3130&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C134644%2C150948%2C104038&link_ref=details_inv2-3nzm-urg4-zw67-rd2b
Resource
win10v2004-20241007-en
General
-
Target
https://www.paypal.com/invoice/payerView/details/INV2-3NZM-URG4-ZW67-RD2B?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&calc=266de826e3130&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C134644%2C150948%2C104038&link_ref=details_inv2-3nzm-urg4-zw67-rd2b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133783279822445071" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3148 chrome.exe 3148 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe Token: SeShutdownPrivilege 3148 chrome.exe Token: SeCreatePagefilePrivilege 3148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe 3148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 540 3148 chrome.exe 84 PID 3148 wrote to memory of 540 3148 chrome.exe 84 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4412 3148 chrome.exe 85 PID 3148 wrote to memory of 4968 3148 chrome.exe 86 PID 3148 wrote to memory of 4968 3148 chrome.exe 86 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87 PID 3148 wrote to memory of 4256 3148 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.paypal.com/invoice/payerView/details/INV2-3NZM-URG4-ZW67-RD2B?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=6d77e1b0-b704-11ef-a141-9b989e8b126f&calc=266de826e3130&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C134644%2C150948%2C104038&link_ref=details_inv2-3nzm-urg4-zw67-rd2b1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf7a0cc40,0x7ffbf7a0cc4c,0x7ffbf7a0cc582⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1668,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2056 /prefetch:32⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2136,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4584,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4724,i,1920785913787405903,7372469137136263647,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD535e00c670b5c04766e0290cf91da364c
SHA1f037d9972082458457f3efdc2fa716021b517f53
SHA2564b9ad31866e1326aadd36f996b394976c594e46edb3318a4b3772080c554bdaa
SHA5125ac5c95f2ce2cf6a16d4dd3016dd495bdcbe45bd08480b37b2d861d8b2277c4bc704c2c5d65eb45103f0d50d5af9e0a492b8053d2f74d26ae42a80cafa0763d1
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
528B
MD5683ebdd54660e401676975a8401a3d4c
SHA15382efcebea6cf464fae328f5ce941eee9fbdcf8
SHA2562bafba2f35c60a7aab9319928d737169e80a7c79127a5d74f660a2fdedf2f28c
SHA51254488e1abe2620c88ab19215041ba1fe4475bd6effa4e2b149a5770f5740fcd6a525022fc84ba8b8327560ec0b175395b0f707cd66213d90db22593e096da6b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51e41cf74aeeac55a9d8e97f07a5346b5
SHA15e36ee4debf6a6e59efbf0c14b84032ee8ab48a5
SHA256c300ea2c195832b3c55e31cc855da089f634e7a2b7b90ad0544bce676ce7c291
SHA5124045db4a0b29044976928256bc5564c8e8fc0259ded6b8ef0f4d24c08fa3753c72b2c88822d726f8495dda740e861679354e21dc6ab62238db930c883fc71127
-
Filesize
9KB
MD57a61e9823b49c8f0faba28216822dd32
SHA12fd03e16df373e7016f7bdc8300c79919092a0d2
SHA2564e3b3138ccac9e98582d94b266fe4525687c8948220ef82d95765c4ab12332c0
SHA512c7347f1cf10d9d0c095c37dbd434f56e7e760e9e05d115428286e92fe2f4662679d217eddbc118d3c8144735570d84f072562b1f4a5b99605853547fb2b1c1fc
-
Filesize
9KB
MD55e998417551c524478606c0390aeb9e0
SHA180f5d8bf6cb83dd43ed5ece7f29f29bf8baeacc5
SHA256cf0fc099e9cb4a97dea2e29a73d4af19f5f062066c057ace096c567bdcfa5612
SHA5129ccef04e2326c7677b536fb0a58c7bf7437ed3adbfbf83ac0a5307aa4d93a5c120bc7c86b1d1dcc4f21e7194646e6cbf3509876932f7a23324a8c2e775dfa3d2
-
Filesize
116KB
MD5909f11416697581c16d8dd208b7f3e29
SHA1000a526c82b0c0b7d3c576c3684413206bd97092
SHA256d64943c740067a4cf63600531a7d5e569a822eb5894798f58404ffb77083adfd
SHA51247ee3dacac8471349c7e905c3129d0706a91a048fd660a5a629ea3152ce343e00de4e610f64f7579d2c64d949962f7a4b2fd632a087197c45799ede5217b6dc6