Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230220-en
General
-
Target
sample.html
-
Size
7KB
-
MD5
d20b91fedc6bd69a3d56f9520bb7aa55
-
SHA1
b7422b6b53c6f087df354f8bbe4a12ae99e94aed
-
SHA256
f34a678bd3a7998fc8b241912cb8e228b05f7d8b40bac9fc003ee9db6f53a843
-
SHA512
b064e79fbda94ee1387fee8e44d77aa50f4763cd8bfbc85ef088d0d05190a6c532b6b234dc06e2ddb240766504401ccc8df5c903f63e03922974f7e31dc92703
-
SSDEEP
192:/JYlsuFsqXxuBXvdLSFfGGvEy1ueSlaKRcs:hWiqXxuBfdwGBaJSDT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133238103809729092" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1856 2660 chrome.exe 79 PID 2660 wrote to memory of 1856 2660 chrome.exe 79 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 4720 2660 chrome.exe 83 PID 2660 wrote to memory of 2256 2660 chrome.exe 84 PID 2660 wrote to memory of 2256 2660 chrome.exe 84 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85 PID 2660 wrote to memory of 3952 2660 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeaafc9758,0x7ffeaafc9768,0x7ffeaafc97782⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 --field-trial-handle=1816,i,13055261095981896699,16130877993396398375,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6d8707a5-87f1-4f7d-9873-0480f326b91f.tmp
Filesize6KB
MD5f3fbcde283a8b44fd30a3232f0198b7d
SHA1beeebd7e7e3ea7548849945f1c6ab9f58ba6dcea
SHA2560989bbd9d18630f45cfbd6ce8cc5a1b7127c723a7831ed16ce01b7ab905fe9f6
SHA5124f504d52910ef9b48974071c29c16c9225bb72d12aa0df98dcad5e15d64a8736331b81e2cf604d506bd79c5dec299a847e2e83f4c312a351fa2132a5ff79979d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\72c68b6a-5d59-4943-906f-24f52e9fdb74.tmp
Filesize6KB
MD5a95c55918aa758c4481ca6171de1ed83
SHA19d2af28ec0b52df6eab6173f32496f1cca2d8e1f
SHA256dc6619003644007e54651dca3987e48b15c60152bfa175c385569d217a2ad941
SHA51264f31b08e2f8b35a471135ff0227e2ff799f3fd5464517d078d151b2d6353516ef2d34c9c57a18a6725c1fc987f5004607582b1c74d62c563bc0829a56aa13b9
-
Filesize
1KB
MD58fc7d0bf0563f1adf82302a503392fad
SHA112afc2137c806ef4e266bd6032c83952e7f83fba
SHA2562b0a8dfd066630ba3b6bd91eb93f1f8fa2460ce0af81e552fedc807365e9afcb
SHA5120851fc0f9a774f02b6bc740acf9da2a6f834057fd764325a85015c71c31f03060c6cccd8b195f587694484a20858ac8a48ae032d1bb23e94e1ed26903848317a
-
Filesize
15KB
MD58b9ab8ad4e07aa116afadda330a064a7
SHA1911e4aac53472daae17aa5e0560d7a035011314a
SHA256040fc8c7f47744710aa68a15433afe620b50306373aa6d4d1f9e0e47e3a50921
SHA512ca39f4d7e85a9352f332fe246b1d5a27b447af94a362b4258f469c401a830e5578a960ec1bc5ec3eb249ffbb65020d4be18629569b88851d41ffd351952488ad
-
Filesize
143KB
MD5011469d8940ee42485f85cdc6ffdd0b7
SHA169c947e8ef6f166e0d8123e27c1c8e940f3749c0
SHA256c37076370040ecdf22a6900dd5f0afe5b060d9aa948dbd348b8cf37563ae85b2
SHA51296722fe044e03862a018541e688f25b915440af3b5410b204b8542f04a9e299025150f22ebcee56735faf08d9e1f328c6065023eb1c5d0666ab69d1777ea5068
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd