Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
KM_C454e_10-03-2023_htm.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
KM_C454e_10-03-2023_htm.html
Resource
win10v2004-20230220-en
General
-
Target
KM_C454e_10-03-2023_htm.html
-
Size
64KB
-
MD5
98d6940a1a027e11cbdbc6fbd66809e3
-
SHA1
4f4450cb7ea8161afef2b6eb2a3f515ee85480b5
-
SHA256
3cdfa3cb709e2fe7c12f95720016705805eea6c7fa99d75e4ad27749b320d572
-
SHA512
de332222953d7082342158ed76b19429468ef322ec880f326f15faf9d6815bfb28cbabcf1b293404530e128e5121d6a84fc6896fdcfa0ecb7c6e5638f4e6da97
-
SSDEEP
1536:fyHhsOiW9hy4AJz3P/E4m8LSQw+vWXYsDpZNLvLaPx+Q/jGTif5BuMVW5NaqzdBu:fyHhsOBny4AJzP/E4hLSQw+vWXYsDpZk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133231970306556267" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 3936 chrome.exe 3936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 372 4764 chrome.exe 84 PID 4764 wrote to memory of 372 4764 chrome.exe 84 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4724 4764 chrome.exe 85 PID 4764 wrote to memory of 4360 4764 chrome.exe 86 PID 4764 wrote to memory of 4360 4764 chrome.exe 86 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87 PID 4764 wrote to memory of 348 4764 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\KM_C454e_10-03-2023_htm.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4b7b9758,0x7ffc4b7b9768,0x7ffc4b7b97782⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:22⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:82⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4856 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4688 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD534a8f53ebaca73e9661baae0ef313fd4
SHA1ddd7fdb9a2bd2da9c0c327c9469dbef0b44e1e73
SHA2560a0ceaa315c7107ab27f510af234580bf041d029a55728356dd2cc14c86bc5c9
SHA51268ac2080724fb08249cdae8a5bd823fda5ecff86a35af7a13303b28cb9821e0cf9bc2d66d27eb6a8a0b1c11426db0c4e5ab362b8cac2722ffd3b217ad9322e1b
-
Filesize
538B
MD5c5da45257393cf72545f4b37cefa94b9
SHA109bd96ad614d261da46375f4364d91f7d09d879d
SHA256f81b5b3585ae672924343ff0107adf4d416a0af4a960c495dd388e1113571c8d
SHA5128345f69b0183c50ff60f71ce23d29f08eba28572e87489d5d48927a3f9a50ad126c386ded1e82c9c3671be136499325f5d5a8507a17e1460074e69d9b377ff4a
-
Filesize
6KB
MD5740da60793c9ff47fe19ee137515cdb2
SHA13a29ab860e90d98e413f9d1603aa1da40b405a9e
SHA2563d3fdbf528028be1be80c6cd2217b5bfabc6e2477a7fe231eb37d0abe5901cd4
SHA5127976e8f8b8bff8f1c819381a3785fd36107dd6d12e825498f16dffa2cd95f6943c6246984768c16fb6ecbf8ca9e5bc2239f3e05baa02c52248429bc35fbfcab4
-
Filesize
6KB
MD50c5d2ad3a19b35d54009b5bed19acc4e
SHA140e10fdeefa5a51fd1d0fb912eda90d71fb577da
SHA256ab0cff7186c1c510231ae69b3fc1c653ac0b8168da8e1e627bb5a4bb061f5395
SHA512855a5235755380cbc4ba613e825819df6ec0e97ddcf53bfb712a89b12eca3431e8b6be773b74bd0eddcb480132fd73a6769fd1681feea99259a0b212b005edfe
-
Filesize
15KB
MD5fa98a625148377afdcf3567b3d7fad79
SHA19be63d1c7a175176d10ebcbdc53a6f9d1d93393a
SHA2564d649628473314f666f76ddd2bde2f6d6e0f6e148d25ee473381a6a4fbeeedbf
SHA5125b34a54bca1224c6bf61b9d193449c0c99d145f20557e8496d84c4c294cf62577772bf9e5172279e2f9ba62f6f3ba2be9988f7d57be89e79f3b1877f3a039af0
-
Filesize
144KB
MD5918876405fe0d95febf8ff228e0df280
SHA1b90b2478f30a0f4937a9ccb0884d017df044d9d9
SHA256bf52536294a0a45ec144abf5bacb1f960aee3693ae626b9f5f46cf2731d4818a
SHA51216155faf2d0aaf64397e664b46f43b244dd5cacb3d146a81d19c0ed6d11df5d584d0891ecf905d29d194073a61558e00acd5ef89c75d5107afbd14b420f068a0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd