Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 17:00
Static task
static1
Behavioral task
behavioral1
Sample
Important - Statement...html
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Important - Statement...html
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
Important - Statement...html
Resource
win10v2004-20230220-en
General
-
Target
Important - Statement...html
-
Size
296B
-
MD5
bf0be77a126395a20ea29b359dba7fcc
-
SHA1
0a4f7ffc0be18419658526d60d49743bc41c51d3
-
SHA256
9ea3037433b2ca1b6fb08b38355f1851d5ba3db76613e3fcf76e834dcd247661
-
SHA512
fbda5e53f412141b004517a7f28a7decf1c017dc0baf93e5e86fa06c591e5923fd4a224ab33cfd1db581b7480af0caae91b9325a8a5546c3c86daee595700763
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227720374130097" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1100 1532 chrome.exe 85 PID 1532 wrote to memory of 1100 1532 chrome.exe 85 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 4952 1532 chrome.exe 86 PID 1532 wrote to memory of 1232 1532 chrome.exe 87 PID 1532 wrote to memory of 1232 1532 chrome.exe 87 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88 PID 1532 wrote to memory of 3140 1532 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\Important - Statement...html"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b60f9758,0x7ff9b60f9768,0x7ff9b60f97782⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:22⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5224 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1828,i,2051703958254998037,14545159426175290775,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5adbd3db0190c0bf332cd5cf82ba8861c
SHA1e4ed04c7241300d7ccd80bece79bfeca6f74a7f1
SHA25610c31c7b7c7fb4206051653e53c966f5184ef85a1786300734f182d72c3d8ccc
SHA5121928b3698a7ce08c516f2e6e4f63410d8fc4061570d18120070f5ca4199dea3b29c0c8b8f4d55bc9174fbff2ae9ec7deff5591481522d200eda9330b68d7ce71
-
Filesize
6KB
MD5e0802e6681ff8cbaed196add5ccdf7b0
SHA1398df30a2d16504eac94dd7d8e005fdd0f34ae4f
SHA256adead0828d62df74787fb96e58cbe18d18132c33b52d555921866323377cafa2
SHA512fd6da4b34b64c1e767323e769cecf41b2df56dcbcd7bb0bd4698d651634751d51658ddeab4e17913f9f1a8ff9dcba0e73c1cd0ed2a279d10f9a24c6e620fb60f
-
Filesize
6KB
MD52aa41ffa480c8c4cd18c3107bd57ceb9
SHA1e176e2441b8e6701313181f8640a88d0554068b8
SHA25642614e0da74ee45514c5194caa72d0997bbd6caeff20640f1c4f563c6034f6c2
SHA512b5c1f55296d2751b634e3e2c7b5f1c3c8412e13a9ade626624289fd83d61d4d4f91b606990795e34316c523302548137879a6c8821b00f4c0bfec21cf418f2b1
-
Filesize
15KB
MD53665d30683311b1a018cf3cf0f5e82b1
SHA15c512305c3379c58b31527d61768c0a147fa7162
SHA2568b7847d5a1a8a663e5197f6f4d2a7ba90d16de6dfd2744d27c4ba4cfef3fd9bd
SHA5127a2dc9ac4b3bb228fe140f571eed8869336cbbf0a063f4dddec3ea93ded3d58d70858eab9f00647c30c7b0f7562ffb44cba8b13dfdfbbed449e3aaf4085f1ad4
-
Filesize
143KB
MD55feb54a8a6218b2f7641909644ecf6ba
SHA104c75a62a1cf0f721af7d94de8bbd3bdffb3b812
SHA25647d12263906418e07e8e380357bb1bdb8ed6580e39804d66863e1074cdd44402
SHA5124c004607fca7dd221a0df415ed46bc2f897037051106738f669fc3b20a17b201aa26ccc8b48900a780c4b55e967584f88f510d9926ee2fe71ee4ebeee2b84d0c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd