Analysis

  • max time kernel
    26s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2023 06:11

General

  • Target

    1040870105837482044.html

  • Size

    9KB

  • MD5

    29833fb7811efb41c05c5b77306839f6

  • SHA1

    ee4c5af329cf40f8f3f3020e9a233a551e2b06be

  • SHA256

    4b9b24b881093311617da9f8be2299032ed8704f7b4befe801c0fc0e4e2848a3

  • SHA512

    67ab8063c53cce70ed857a358f0e56d7505ae9acb0e4da7fb17d01d3089dc42b904d3c13a091228e35de73fdbc39b75ced2769656dd90ccfa5309b7baf163475

  • SSDEEP

    192:SMBuroRrk8CeQwE7xsQR++BEaL18VHvG5gayThrxFSCw:VEsR4eQ/7qQYi4HvGuaOhrjSl

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1040870105837482044.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1016
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:672
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6629758,0x7fef6629768,0x7fef6629778
      2⤵
        PID:896
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1212 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:2
        2⤵
          PID:752
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
          2⤵
            PID:1640
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
            2⤵
              PID:2036
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2380 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:1
              2⤵
                PID:1704
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2336 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:1
                2⤵
                  PID:676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:2
                  2⤵
                    PID:2560
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1368 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:1
                    2⤵
                      PID:2672
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3956 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
                      2⤵
                        PID:2712
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4072 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
                        2⤵
                          PID:2732
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4204 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
                          2⤵
                            PID:2916
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3968 --field-trial-handle=1204,i,11428749762459287336,5750860880398579936,131072 /prefetch:8
                            2⤵
                              PID:2748
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:2060

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                              Filesize

                              61KB

                              MD5

                              e71c8443ae0bc2e282c73faead0a6dd3

                              SHA1

                              0c110c1b01e68edfacaeae64781a37b1995fa94b

                              SHA256

                              95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

                              SHA512

                              b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              b63fc666f09c1a7374106dc3a2ae817c

                              SHA1

                              b0b2b7a4c931c3bf81165b2dfbfa1767a2f5a8e1

                              SHA256

                              79bb3b95b5f0608e7890ad16bbb7c57c1e8425b43816b607bc3c46d61d977ced

                              SHA512

                              eb0e2fb8a5be33f5122b7f0c00cd81e3f828c66003ed43dea4701576f420e9ebaa490690a20f94218f817f0094646019a61eeb668759cc4f77d40b21258f78d5

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              05efbdf90f9c2ea0e5d5cd0c6af8cdf0

                              SHA1

                              53af0625ac04de01177487cc3cecd0e067a7e67a

                              SHA256

                              0e96e86976be93bbb2cdd2dc28aa001d1c65587630df47c441dfdaa873ebb7c8

                              SHA512

                              7585d20492295b55fc4dd09a6915bd64130fc309e97c9b3ad9862056601f1a00c1cd00087d0eeda15ed08b2e3d5d6a3299c16c1c94ba2238b7d6fe38caa1c1d9

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              549e2a6855e754ce71a51d248e9bd82d

                              SHA1

                              31639cf5b597d3c965b99f4eecba9162d7c9ffd8

                              SHA256

                              10d012665faaf90f7842e4db0fdae2d936ff4f9ab1409eda2afffb29d4e11bd6

                              SHA512

                              5e7b2a3adb14d797e22c75db99471d8ee5d9f3a482320a268b8ca215d3c43b9a9e6d86ac52d0015fe306a9f4704a56310a831360fa4b86308fc67bd964da8af3

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              52498215cfc12d39a2c0eb8b97e345f4

                              SHA1

                              cca54628e1bd5eea456cd9ae2c321c722098e16c

                              SHA256

                              185eecba34707cb0baa0d940c0f280642c52e7d169d7fd0925f9b67302e84142

                              SHA512

                              88812f0d3d8ffdb55b87d0d10c09fd38a286b1fce412b5122ccd47813bb87cb5dcc2067f4bc258b6efce5a0498daf9f5241fcbd8c5797bb13792ae5a2f1bdf2e

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              0aa593e46a8dd2c190aa7bfb2dc7c53d

                              SHA1

                              7d47eb2a2ae24438bf575da3731132eba0334f2b

                              SHA256

                              8a02a496536c8e2a3b2f2786a8844a5345b9e63c8a8b9ebfc6ebb8b5f53c7957

                              SHA512

                              541c42d203ea26cba82e28a07d3fdc90fe03b06b5e52ce3589a9bd38efd4e5c4f6cd2eccf55e0f73b62861a2aa7585eee5af5a6241dd74a49435d6230de87e6d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              363B

                              MD5

                              ec71dc1727cfeb4963489e5e0e250cc2

                              SHA1

                              d486655cd3b42a9eeeda13b30a0442270e3b7223

                              SHA256

                              4feca79788f386cfbc7318c9207e03d8053e2d4d988ec8e864a318506953aeec

                              SHA512

                              66bb665a502b1a67e8c8e373c250d7ab33867ffc71b2f09a896e54309ba1e483bf764fcc931156b9ab82a0dd858f7b50e4e4ea94bba188ed39b4e1eea59e0eae

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              4KB

                              MD5

                              ea472c70fc801896fa2394b14c4dfddb

                              SHA1

                              cb9994586cd0e2d3e28d02311efc118a13526847

                              SHA256

                              1406ff9211bbc228ba4bfb926f12c277e413fb6e168ee619148da462b5d08368

                              SHA512

                              fc2e3ab3ca2571aaeefa492e54e295ba7952b672582027a4b04aa8fc439641ddc08d8b55a31fa4f071908f25be0036523d6e0e7d2307092e709c2874853ffeb4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              173KB

                              MD5

                              1d0ea39ce02aafdeecd41db1b5f8678b

                              SHA1

                              a8c78e9478beaaff4cc33f26c52eacbfd973d703

                              SHA256

                              46487c5bb3d443895d92353be6af2da21292bae444436899d6938baca79119ec

                              SHA512

                              cb33a01a03ff1e7c4ba26a6a17d2e8165b1618e13e9fa80eb2d28c16ecc76bfc80d7999e6b4e9d2c5da297104f6e2ca8c09bcb6e410ed60e78db4573d44da910

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              173KB

                              MD5

                              7033f82701e446ce03f9d1888d3cbc59

                              SHA1

                              eb13b7cb4c4c1444306e94dd23bd0eadae1737b8

                              SHA256

                              ad3cbc07a9723c8f2349d6765dbe96bdce776a8eead05354f4ee6900725e98bb

                              SHA512

                              8b95bb648457090d7175850b665604daf44fcc4ec34734b00dc7b0447e9fdfdde6b1ebe6b16a05886114b30d855acbc4422488c1eb5d0a74a315eb2e2b01d3bd

                            • C:\Users\Admin\AppData\Local\Temp\Cab3EF6.tmp

                              Filesize

                              61KB

                              MD5

                              fc4666cbca561e864e7fdf883a9e6661

                              SHA1

                              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                              SHA256

                              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                              SHA512

                              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                            • C:\Users\Admin\AppData\Local\Temp\Tar40E2.tmp

                              Filesize

                              161KB

                              MD5

                              be2bec6e8c5653136d3e72fe53c98aa3

                              SHA1

                              a8182d6db17c14671c3d5766c72e58d87c0810de

                              SHA256

                              1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

                              SHA512

                              0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff