Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
ATT35547.htm
Resource
win10v2004-20230220-en
General
-
Target
ATT35547.htm
-
Size
72KB
-
MD5
25e66c3ccf606c83a44982f09f57ae11
-
SHA1
2c8dd9f838f1b40d6fe764ebaf4e434403d4d6ed
-
SHA256
cdf1f0c3d78163d76af249b895be6d098272f238deecee5be387b1bbb2637cc5
-
SHA512
8489659ebbdd58fb4dd49c3d00c0acbe1b1fa077acef0e6f86a6ae7bcc7d68056e77ff9dd89816ffa0bb4f798617b5c94b249802611b3e13f29535bbb1e201f7
-
SSDEEP
1536:vJMOv2X4rwltoctSFFeEzCbO1VLRNGEaEYEeaX+vr:vJY4rwl+cAFFeEzCbOC79B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240728165301488" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 4784 chrome.exe 4784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe Token: SeShutdownPrivilege 2016 chrome.exe Token: SeCreatePagefilePrivilege 2016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3228 2016 chrome.exe 86 PID 2016 wrote to memory of 3228 2016 chrome.exe 86 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 4188 2016 chrome.exe 87 PID 2016 wrote to memory of 3256 2016 chrome.exe 88 PID 2016 wrote to memory of 3256 2016 chrome.exe 88 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89 PID 2016 wrote to memory of 4372 2016 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ATT35547.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd2559758,0x7ffbd2559768,0x7ffbd25597782⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:22⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3140 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4736 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5056 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 --field-trial-handle=1776,i,14572252961942430028,6746897830815624370,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5d82f1973da84697d7021e84560311938
SHA1869029a61ef21a324487efab1a72a813d03eac53
SHA2563cd46ec168c5227e18560b2e4fb213f1aff2e42be03fbbd3e9180b68bd8b43aa
SHA512bfb57813d37cb8d81833ab7067b133db8f6c05d62af99561ecf564fb03fb27112f799f5ef4e802c27bdcdc688f6e1aa981629cef078636143e87085785ec7fe9
-
Filesize
1KB
MD5852787b31b87ce784723461f89ff23e3
SHA121fabf29240aa0430073f4cc70344c020ccab59d
SHA25695b0b0e9d2f83308f5fccd22dbc6557b098fc93bd5946cea53cd91372bb5721d
SHA5120e2d7e209d418620d3d1e484c20e621d55597801e317a05c98da6929fa7ce7ad8bfebea4c37ee4f338023c270d014b9d7d47a6f361974f9d994cfa80844f4221
-
Filesize
1KB
MD5e8f6f179a1c14f865be7949281c4d5cf
SHA10d5f140435bd4a40bda482e88aa86c167456f144
SHA256b6443278c8c917c9c44cc2eead4dff4dde3957e438f39b1034cc923b3f9fec17
SHA5120eaecbec71f0e4012868609a116b4a062b0727a29f97a912476498ffed3594e1abef82e156a63563eb305b4d85d063a00f167f713fa61737cfd52eea392f03bc
-
Filesize
1KB
MD5b41293672d7e1889fda740f3172dde3e
SHA1f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe
SHA2561e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e
SHA5126c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147
-
Filesize
1KB
MD5f2161e6162e3f2dd546c51466f32b4bd
SHA1a251023785e7371ef7aabe1b493fd53baeb64454
SHA256f7da1cb2a7874641d381fd97de1d189c198d6fba8a94f6780e51775898e97bdf
SHA51244bfda3b44dd450c0e1a3b99fca781fb9ddb8fb7f2b4b449cd8220e7a8325f6c1a8be8306adcdd58e0a42757d34d98274ce0cfb994e0391ab74186d20f5729e8
-
Filesize
4KB
MD57e6a72c436ae9c41b27ad10805b17466
SHA14fc26a6030963ab2e8a1cfd5a1a19cb01e3e8841
SHA256a8f99e1f0a06329bc99eedea9c1e65b56dc2dfc754906e89e70c05109f14d5f3
SHA5126310c0b67d05d1760b973778245178fa0d8e5fbc897b9a56f9fca9b899b954078cef55bb6990a6d6ac91cfad77c2d7613ab23c4948b04823577c9cb6b6e2cc90
-
Filesize
4KB
MD5079ce00e07d80b1fd9bd725c645933ee
SHA184d230c7d9c5f62edb3971dbbd15dafc4d9a3b7a
SHA2563ec40b058d3fe7c702eadffb492402b20d6e1ff3cb3a7760fe3c6e4f2addbbb6
SHA512ba9b9d2f01fd518dac63d28ed25e169458d1f16f0c58e982406087d1c726add659f87897e64adcd0246445d2add07c9ee650b52478764cc68e0574893f34bae3
-
Filesize
4KB
MD5d20520c44a91833ec634979066ca30f3
SHA1f4f849cf539aaca5edd651df25e5e1da49ffc0e8
SHA256da52083c1b9d3afbdbd6373ac333649fc6b3552b9e46e60795a82935b4978804
SHA512e1688f224996d9d9fc61136545e1fdf1edbc21a32f6f9648d35854608eb13bba1f7bd41e955e80c9c3e8dc6b71390f8e4fa132dd9ec55414298ad1899766bcaf
-
Filesize
145KB
MD593e80bb49121fb4c114aae6aa565965d
SHA1258d0782f16dc53b03d88d06a6f4d655be6f906c
SHA256bc396f0c0da8894c459285ebcd33372c0a7a67aa6ccaa550beff1286361a232b
SHA5124dc60aa61182447621f86c74645de90d148e50fc28239b933fd00c91589953da1144df3d648f44f0ca0a43223a0137f6632abac53cacab5370d5be763f3ccd9c