Analysis
-
max time kernel
27s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/03/2023, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
ATT42345678.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ATT42345678.html
Resource
win10v2004-20230221-en
General
-
Target
ATT42345678.html
-
Size
2KB
-
MD5
06525535ad965bfb0772ecac13bf1001
-
SHA1
86ff6440aa29a0c4ad6fb262c86d7a50ad615131
-
SHA256
abadfba5d8cf8812faeb9b5186e18572be8ea2fc1bdba988d72377a9ad04a38c
-
SHA512
e437674994c783f48340131a5e1099a2f1f774c18b4c1e9f86411bc1f88db09ac69898b2e433283eca29ad3f9946e8988e8c5265075382a1e8133a7c1c3c9fce
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1460 1408 chrome.exe 28 PID 1408 wrote to memory of 1460 1408 chrome.exe 28 PID 1408 wrote to memory of 1460 1408 chrome.exe 28 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 780 1408 chrome.exe 30 PID 1408 wrote to memory of 1988 1408 chrome.exe 31 PID 1408 wrote to memory of 1988 1408 chrome.exe 31 PID 1408 wrote to memory of 1988 1408 chrome.exe 31 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32 PID 1408 wrote to memory of 1980 1408 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ATT42345678.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72a9758,0x7fef72a9768,0x7fef72a97782⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:22⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2112 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2088 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3668 --field-trial-handle=1296,i,7719065638811670344,5971403521941948946,131072 /prefetch:22⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9e2bc51e-8268-4892-a94a-d8d3708b07ad.tmp
Filesize4KB
MD5ae375c357e6691e8dce5a7e5bac5d1b8
SHA1222ee789ed69d24ed9759509f16469232592b0ed
SHA256d9e36fed7f5ae8032be7cf24445ddd171deeff2088c38f7a4e2990302e46ed54
SHA5122b3c746693dc3548e72c221a776cdd8b3495340521363de5f6aa9870b27b9878733d6a173645a7eef340821fd6a330735fa0dad4b57316ba3ef22e7716221ed7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD53319ab7860415ce8b74206ae767cb97e
SHA10910370a48c7d7267a9410726f3b2bcf5ad1b126
SHA256ec0531225ee094996e0d7c46697d848a236417968b2c62aaa0e364082adc4e7a
SHA512f604341b056336691c8ad9986198a2ac73c7b16be4b88303274c5abde871e1b6cb4b454da8a52fa8fbd24bc64a59ee00e6f0da2081d802d746837eb7062160bf
-
Filesize
4KB
MD574bb235864219162cbc3b84993c0b2cc
SHA124f6e528556ff900912aa0c6445d771a2cdf2f5e
SHA256adff72825f301915c3c84e68d4bbb58c93070e7ce79f8c1acd3d955ffd8dbe0a
SHA51292b804d75032235ca5208231b36541d453a76298c90896a451947fbe6301f9389e4957cd3f57bc3ba7630a2feccae5e69b138bc9c7d70d488a373572e99e05af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389