Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 13:18
Static task
static1
General
-
Target
ATT007353456.htm
-
Size
20KB
-
MD5
6e92aa7bfb331f40d16eb18e651c8de6
-
SHA1
8cf6c453310933af20557db2ff7c0593b0097b51
-
SHA256
f9e0c380ac0a4fec257f66e445f2cc9694c3ce713830150596cae61b5298d6ef
-
SHA512
465b00ad2b98675d1a7b061321a7b8d3f4b611a56b9fdc9d6f7a0e5b5aa82a664dce90c924059c9a3e5c406d85eaf544d64caff20f41c6ef5446bb75db495cd2
-
SSDEEP
384:suYeGHpyxop0Y01Lk++FTVnHq7X//VV9gn6F3QusdHLY:vTRup0ZyFHiXS6pQusK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237966898620039" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2052 chrome.exe 2052 chrome.exe 896 chrome.exe 896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2052 chrome.exe 2052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2052 wrote to memory of 2840 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 2840 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 1584 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 4400 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 4400 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe PID 2052 wrote to memory of 5096 2052 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ATT007353456.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6ad79758,0x7ffc6ad79768,0x7ffc6ad797782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4448 --field-trial-handle=1812,i,1344567230876054046,450114390988037473,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD50b177a5a91676e48cd83071ab9f0d97d
SHA1fdb2b0a6033afb74f05013e34aaf8ca4fbc0df95
SHA2566b7848059f90a1c4303932c0f2427160f18a166a2551c34f9a8b31d6b1c0d834
SHA512ca74c999a4879cdd78205196453081d84122f5e68bc226405027e5695581460ba994beab7663073e068aab5a1159745c8e585c7f9547bf4fd0b4ca3d5fc3a4c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD50669ff41189e339fa8969638cb05570f
SHA1d7864d1eae4ab5629ee66be8bf0eca0f92e40e39
SHA256b7fe0302e62448d18f3a0b7fcd8993c99d7d9cd958e227803b407138e06ef02b
SHA5129db6225f2fa05e1e0247e9949b95c3c318eb1d8b3a118b0bd62450e4e92a6271243fe74d3a8707abd84f7e04c49ffc78ff29bb463cf3af7e2c6f14942667d616
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5a428d1cdfda76bb23ac4b3a4df18823d
SHA12c8c1ca6786b7a27f61d24f7e71e5712b2c397f8
SHA256b93aa42ae373962ee5db0d9293fdf4a7c2403f016716843fce01ff1833638ec7
SHA512cdd41f3524d79dd1b605590df9a9fdf556967421dbae39fdd3ed255211ae9448fbe86136f8f2117e0e0bd229d8bce833ac9deeafe2a88d64d616e08bd218128c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD53e6d9bd8a850fbfbd91aad60247a67aa
SHA1df09327c4069a0598859c03e8451caa618d11e5a
SHA25662f2386dedee2515f76a66b4689ee9af13e15c701a65b217cd08999992df0472
SHA51224a2541268c31ed143fd1c537c85dc5d563071275d1ab106f83cbc959227734c290c5504b0ee0d81486068e35a6a4cbf190d9a79bb39af8621f7d8f7f2dd9b26
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5037d294b847f573316c6704b49f47b5e
SHA1463f9f277b86683ebedf298e7b32a44f2af154fb
SHA2569acd31315b1753c0e02791c8150dd1e56e4e89ebec794c94550c068d3fdca9f7
SHA512264d8250dc97658d3f77b8506310d7afb7627dd8edb454b165ffe7b1bb895014b794153d2924f5be38c3f60d07c4885b2049961451e677c65696eb5e263c86f2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD55a133ef0d4ee908339814aec6a9e3a50
SHA136d2e511e1d4e7f6973643217c8b79ef665b1793
SHA2565b18e8555b1185f33681d466c7821350083cd2eaac3212359395d079c09cfd38
SHA51270e2a8ba2c504346b4e641f374431d2b813a67f9b435334bfc4a1c38e1e7461b8ea8e207d1894710569fbe8b23a9ea9c6abf03481ffcc70f65c1d11344c401b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
143KB
MD5f2414cb2a6a8e4966e3affdb6a536dc9
SHA1ca7c5ac2db453114be354b5897e6483568de5609
SHA25626699f9cd6854fb66d38fb4fa5ab1a3f3265d4ff439b2be82c4a57b9b9aa9d67
SHA51296b335538425b098e6fd05e2257f22f97905ecac1be74d26bd28ea9d933253f0a1f07c78fcaeb575e49305ccfae5f233e523bb09b45ea0199bc9edc51c10ac3b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2052_YRDMLTZXRIPMJXMWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e