Analysis
-
max time kernel
26s -
max time network
20s -
platform
windows11-21h2_x64 -
resource
win11-20241023-es -
resource tags
arch:x64arch:x86image:win11-20241023-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
18-12-2024 21:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/invoice/payerView/details/INV2-HL8J-VTHX-D8B6-N8WU?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=081dbb89-b96b-11ef-98ea-a1584904c289&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=081dbb89-b96b-11ef-98ea-a1584904c289&calc=6a7eedd94931e&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-hl8j-vthx-d8b6-n8wu
Resource
win11-20241023-es
General
-
Target
https://www.paypal.com/invoice/payerView/details/INV2-HL8J-VTHX-D8B6-N8WU?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=081dbb89-b96b-11ef-98ea-a1584904c289&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=081dbb89-b96b-11ef-98ea-a1584904c289&calc=6a7eedd94931e&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-hl8j-vthx-d8b6-n8wu
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133790326363452283" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3100 chrome.exe 3100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1348 3100 chrome.exe 77 PID 3100 wrote to memory of 1348 3100 chrome.exe 77 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4180 3100 chrome.exe 78 PID 3100 wrote to memory of 4524 3100 chrome.exe 79 PID 3100 wrote to memory of 4524 3100 chrome.exe 79 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80 PID 3100 wrote to memory of 1368 3100 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.paypal.com/invoice/payerView/details/INV2-HL8J-VTHX-D8B6-N8WU?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=081dbb89-b96b-11ef-98ea-a1584904c289&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=081dbb89-b96b-11ef-98ea-a1584904c289&calc=6a7eedd94931e&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-hl8j-vthx-d8b6-n8wu1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7a55cc40,0x7ffe7a55cc4c,0x7ffe7a55cc582⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1708 /prefetch:22⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2032 /prefetch:32⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,3023383403156567014,14362241064936974123,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bcee76d0c67b79262d912f6308ae5296
SHA1ea8b8ee38c5c505e3651628225774d04b289512f
SHA256e746abe0f25f8bcf30959dc51b41c4b454a85d683eb10b0f78efa3471bc3d157
SHA512378c94b03410c288537847ca9122f5e00e05d092194cfd675d45568dd8b63c1850c5df5ebca0a4007ee3582f1749ef57b91efb83bd405ac7020438875736855f
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
528B
MD502b73b84e6d94745913ffe71ee43c2e1
SHA17157d29aadcb5fb6a254ff3e859a241e53eb99ed
SHA256ec32ec6255772961ebf88c2be06ac1f5047c78bd49682b54fe0569fd6ab53fec
SHA512b8b86e60beab4e60e3e0ab7eb0def45ddcd149c97ab0d2a4b096aa3e8baecc17be36430da348b1adb556497bb1e1550b0528a1dca4146d7379a187d9605a06f8
-
Filesize
2KB
MD5297dd4f79014333a28a334c9f097d4a6
SHA1ddb85778939da7e458c5fb7fbaeeaaa5ad0133a0
SHA2560cfedec1e670232b3760e38414ca9d278688a2f7f8f571393ba2730490505ace
SHA512736a1d99a598ee0ee13df45d7a20a8be213cfa36fd54eba1533f900992c2bd2a56251f7c0b32dce9574cbd1354550427e71c95915fb2afcdcb75e43304a0ab4c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5010f539a059c182c65e9d054a40ac001
SHA15f7c5a488c2d7b88b63d4b32fde292c6f5b428e2
SHA256f48166d75d2883d6bb62815fc4381a7d430859c68d7c62ccc4fd62b6e71c5ccc
SHA512c3e7482b43ee46334fdc5bd4c587e870561080fb16e39d8fa8f4fc1e772f93f256a0eb2008bf4dfbcdceb7c45e0448b8bc70f198b8595372eff20c929b837df7
-
Filesize
9KB
MD51a933755c0da5edb4107a0fbb792414d
SHA19d5198ea3cc2d9bd7821fa2e37959c9833cb3c51
SHA256a7f4b081ed22692cea0de2380ef9eb36432264fa38d5c0efe83e24e1858b149c
SHA512c706f0c3fed68001745fce5ffa8e68bb6f8087e852785d55921e2c0bbe861308c0c155a8ad9a9ba89136d4e4c8a6f67eb9349afc68f54cbeb29444cb86cffd83
-
Filesize
9KB
MD5978ce53fefa36f10fc3105abde5a6204
SHA1367573e8216b439833d399d9254e23da4322fd1f
SHA2563940b158dc01634816c1331191cee7d9a74d552debfc4ad0b1035d81de7288fe
SHA5127a971d5e59fcb9620b2b9725e9079a4078ea7b65cbf3010fa94441610cbe97b3f8832337d42f98738a2c8eaa15093d62253b09efc33b0b92d20ee89f6849af34
-
Filesize
118KB
MD50bb72cd33dd6c73eb369619e7ad943ab
SHA1247ae725fe18309be1ff7eaf2038f7e98398878d
SHA256a1b86144c2f4f29698663620d0803cb2291c8e60abfc03a8442d62e1bd2bbd2c
SHA5124ed52f58be8404bc8543cf8fff5dd695917d4f3fc661b299e767e9329b85c11f6c8c7be3597d1e5137eb8e3a711ad42705bb7449633bd7804fc763e112381f71