Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
ATT01654362.htm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ATT01654362.htm
Resource
win10v2004-20230220-en
General
-
Target
ATT01654362.htm
-
Size
72KB
-
MD5
6dd3612bf16b979aca9291ad6495ee33
-
SHA1
5f9abbb322fe72dd72e8e874d709ddfe1c61f30c
-
SHA256
6866bc8afc508288bbb968a4c0a9cd845b676e4f41ad026e265a060cb472f5ad
-
SHA512
34401d1954b6cd5b85d2f4c6fa16c5f8ae897279a693bdd49865fb5d1037d5d0e5e26cd45af5d0fa3436968d1f9c82ba4a9cd197f1a178349253331165d6ffc4
-
SSDEEP
1536:HpNQIOv2YR4rwltoctSFFeEzCbOPgTPT8T0RGew:C4rwl+cAFFeEzCbOGm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240638391336821" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe Token: SeShutdownPrivilege 4712 chrome.exe Token: SeCreatePagefilePrivilege 4712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 4168 4712 chrome.exe 83 PID 4712 wrote to memory of 4168 4712 chrome.exe 83 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 2760 4712 chrome.exe 85 PID 4712 wrote to memory of 4788 4712 chrome.exe 86 PID 4712 wrote to memory of 4788 4712 chrome.exe 86 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87 PID 4712 wrote to memory of 5044 4712 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ATT01654362.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff931429758,0x7ff931429768,0x7ff9314297782⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:22⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3328 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4504 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5448 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 --field-trial-handle=1804,i,1591359674830214446,15915175131509163053,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5ad4d16bfe18b079285c313d77d8707f3
SHA1a802a3fec12bd5dbee9fe127734ea5b61e32db11
SHA2568d14991114e5f9248759344facfe4ee088ff7cb9d82c3fdd0d6a1b113c0942a2
SHA512d0e0629e916198da3e9c68e50fd8ef9a9ba98f84cf335107d2cf4775f40741fa408db765b32ce09f507fba354e8d18f1ba0124bdacc7bee3649457439130db81
-
Filesize
6KB
MD5036189f8b2376823bc24df4e3e1d43cf
SHA128370a44a3e47e2c7d36d0fe256518166cda3989
SHA2569a4289947bc9f9e39cccce5eb13425028c414772b9e7167649b71907c0575ddb
SHA51275ca74cc00368e59cbfb0af256f1a1168bad6093331447c57ac6131837630592d45167e7ba5191ca4d817d84613d86645fe3a3bad726e6394d9249d852cc73ec
-
Filesize
6KB
MD5768bc44d1cf5e70858070122c37300fb
SHA1aa4443d611455d0afcf67ae79ecd3dbc960db09c
SHA256a14d8e946ce0355f9dddc1358b2a1d11c88b7baeb34cde597fa896109b6a0559
SHA51219235c0f16608d2e2fc2d7ad9042d71c289531e29a5733333bc34a3f5c12b0c25b185f92d293c5b0be1862fb2238ce10d0a9d8b4a83d045b804597062eb12bdc
-
Filesize
15KB
MD550431185566b81d2a68c13ee4fb215a0
SHA182381be6ab0499ee000f190c139c03d0ca6081bb
SHA2565fb76b9c6b87626157e8543532ffbe5ee2327e4e68052c2486089a8b6b071d83
SHA51208a6abeaf20b584201edd659832f7371c8e899d8df26b0fab2caac2959e55aa550a5cb4aa81acedce3bd3346321c616b7517e64ce37daa60cc7b073d79c0fa92
-
Filesize
15KB
MD5b8572be53b8533e086a3718de020c553
SHA148a2aadaf170d9cf1fe480632d8d8171f84350f0
SHA256e56122a5ede0f8e9e6c03d520a4385c210708fac83f9064b56effa511771c319
SHA512a975b2619a1f8b243f284baedb1106ca94c32b643587f0419059ce19366b5ba0290330602b80fe5f313d13a32a5a37ca7eb081b10d21ba9373fdcaa44b5b03d0
-
Filesize
145KB
MD50fb3dd4974bd15c019f67397a835fbf0
SHA1bbdabbb330d881a94bd321eb771d58b5a046a464
SHA2561e6c319bee984e96d57012906c20e3e61e47920c69ba245683c7c854a3db2b00
SHA512f0867b183cef246d71570c10376a9f6c7a85aade154a721ea991d86e12bc43dd6d1308a93c13c84e8553380d3d8fb6101f3b3e8f0182b2e4944de3ceaffc84c2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd