Analysis
-
max time kernel
92s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
13-01-2023 18:11
Static task
static1
Behavioral task
behavioral1
Sample
1673561801.html
Resource
win7-20220812-es
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1673561801.html
Resource
win10v2004-20221111-es
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1673561801.html
-
Size
10KB
-
MD5
58a4d6c6e82115ccced658e7f5b32563
-
SHA1
f920664081abeade37589deb75ddedfd2383d8cf
-
SHA256
e2f0280f735e6fcd8d324ac6c2e04805d156839026b62f5d6ab0a72f48abf16c
-
SHA512
1f1d6820c72865449f9e9d5098ecdfacac03e22c6cda2aa4ccd1b367c1945fe3fb905c96267a66392a7cb21b6026ff4e10a6febcaaeba46776639990fdb54ac5
-
SSDEEP
192:CMNdn/8INYkWjJMGYel89s+XStRGBtrBtziJOyiwt0kwtGYEWwtOTQ+wtxVwtoBT:HEINYkSJMGYel89hXS/GBFBliJOFwtrd
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1248 chrome.exe 832 chrome.exe 832 chrome.exe 1844 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 1776 832 chrome.exe 27 PID 832 wrote to memory of 1776 832 chrome.exe 27 PID 832 wrote to memory of 1776 832 chrome.exe 27 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 828 832 chrome.exe 28 PID 832 wrote to memory of 1248 832 chrome.exe 29 PID 832 wrote to memory of 1248 832 chrome.exe 29 PID 832 wrote to memory of 1248 832 chrome.exe 29 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30 PID 832 wrote to memory of 824 832 chrome.exe 30
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Users\Admin\AppData\Local\Temp\1673561801.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb8a4f50,0x7fefb8a4f60,0x7fefb8a4f702⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1056 /prefetch:22⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2404 /prefetch:22⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1508 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1696 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1048,17301264047023438808,16662783029005165594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-