Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20220901-en
6 signatures
150 seconds
General
-
Target
sample.html
-
Size
48KB
-
MD5
9e5b3f59c64adfbfe88a3c47a086d1e3
-
SHA1
df9002f6ad354870917c8b74bd5d7b70caffc90a
-
SHA256
c97b54e74639c96a29eddd0fc8416ef4462d44cc44d645ea83f0df3bf2442052
-
SHA512
f27cdfeee72036ca56ee278a55eabf82330beb66e499519439ccbad9459a2b9a078515e8f43ccac6fd4cf0f82e2585fb2d4c4adfb49633f19d973081d7816b26
-
SSDEEP
1536:4CA2sryeAj/kkIsjILAdk4f+EGnBbEaJFbEbJPbEmCAbE+YQbbEZ5sbEMOLbEtYb:pseeqkshgNDQNtUB2dyiOGk7HIK
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 4904 chrome.exe 4904 chrome.exe 3220 chrome.exe 3220 chrome.exe 3628 chrome.exe 3628 chrome.exe 1916 chrome.exe 1916 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4856 4904 chrome.exe 81 PID 4904 wrote to memory of 4856 4904 chrome.exe 81 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3784 4904 chrome.exe 83 PID 4904 wrote to memory of 3740 4904 chrome.exe 84 PID 4904 wrote to memory of 3740 4904 chrome.exe 84 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86 PID 4904 wrote to memory of 336 4904 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb87494f50,0x7ffb87494f60,0x7ffb87494f702⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1712 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2296 /prefetch:82⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4352 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4504 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1668,3266644307274537591,1801664422621499237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144