Analysis
-
max time kernel
1801s -
max time network
1691s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 10:17
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
download.html
Resource
win10v2004-20230220-en
General
-
Target
download.html
-
Size
16KB
-
MD5
d3d23794fa0ebb8ffe34e097a74fa9e0
-
SHA1
a8c2ebe5d93c017b83aba9bc4a6a0e0e09c5d6ae
-
SHA256
42e062464b3bf1a5a4e964ad1b7928f8685e94be59d6dd6ca9d69958e6b84f5a
-
SHA512
72f8e7f248dd6cc48035c15e36347d2f2443f0c279554ccee9befbbed52387adbe96d16867772df17270b198dab0f33af2c00635fe99800704ccd56a6463604b
-
SSDEEP
384:YABqqCxuaNNzcuBLZ6nkp13y5o0Af02O7Jj+LC7K:BXaTIuBLEnkXOwOkLP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133248179093472753" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 368 4632 chrome.exe 85 PID 4632 wrote to memory of 368 4632 chrome.exe 85 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 2884 4632 chrome.exe 86 PID 4632 wrote to memory of 3988 4632 chrome.exe 87 PID 4632 wrote to memory of 3988 4632 chrome.exe 87 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88 PID 4632 wrote to memory of 100 4632 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\download.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade389758,0x7ffade389768,0x7ffade3897782⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:22⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:82⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3332 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:82⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2856 --field-trial-handle=1816,i,1445883565639105894,813692765913284280,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51e4e9cb00d8909e0b1c90bea15db5b3a
SHA1e2188a7d1997ae3e83253f97d80bfedd056ddddb
SHA25685bb132958fdf263f96ca6198dcd65f0b31a78ab0df24e8afabf05d57321e6ce
SHA5121b96b568b1bb6b818be92042adfc9e9bcd90ff6470f9a19eb9cff2be0a23cfcf0d343f29083df4a85e2ee81d7c16b099fbfb3c5f7b8d2b33a0ebea204fbe1db2
-
Filesize
1KB
MD5638d6df675dcbddf918ed20b3aac0589
SHA11873ede4d40207662baa654aa655647e7f78e27f
SHA256882cb04206d16e453d32129b86b7506bae9fa0a8a0b8c0df3ac75f2ba7aaaf5d
SHA512ed5a9af235e11740a059b5bc1ede6094a063e29bc605b5a851f0516597aa12d7ada30ab0eb9cf9e4775301e37d6e3772e488487a23fad48bb3be9acf8c60a560
-
Filesize
1KB
MD5dd0bd12c3fda267634b3fa457ced2463
SHA1971861d717f9b80feb2baa0d326e9365d34df354
SHA256bfc17d84873f51b6b8af643995cebeb84ce6e6d9acadbbe920cb5a05649ba60f
SHA512096bc7d766b0e531b07c8e9465718be6f92b113e8a2f7b04e10d05a664a56af4d37d3e913243cad3f5915789d5b3c711e6cb36923a42b2de3b18b46bdae09b3c
-
Filesize
705B
MD5e358a2df4a51e0efad6754d6a0190901
SHA14931e625ff3bbc9091f1a7cd23f8dc9efc07055d
SHA25694eab9c74284fc18e236a26b4ee42da8c9dae81d5ddeb44f93b47ecf1ea9de37
SHA5123d2c2e53a10b8e726ed21d232cde10089797364556e9e70ddf249d6c9b947a99042ab5283267245a9aa0d096d050bdd68b9aea22dea89bbe3786dc78a365ee92
-
Filesize
5KB
MD56b4aacc65d0d18e552ac28bc704aceef
SHA1a93c126a8c7c59dd8c935232dae931b453e4abfc
SHA256fe4a518956c432c9d018e455de250a9826112d0c79b2c30957c67baf5676e13c
SHA512730f884109f997efdf2b10134ab57b7137ebc3ffa49679a01508f9fa5e52ae7678cdf204d0eae6a7e038c928d45907870269a7c147aeb27dc8b55a9919aebf51
-
Filesize
5KB
MD531b8e68043a9a20bdc0e44f20257ebc9
SHA1407ebeba47ee48ddb1a0b815bd1d4b494c2c7d71
SHA256d019efa8b5602fc6efa2c476c417d2a8d0d824529c98852fdc8b96d1ca521791
SHA51235164c3a97fd1471eeb226202ce6bc2b203bdf1179c6ab15f3d6cfdf1c88d0332e75ece150cbc292458027b7c1a4d71a05ddd04ca82df90bf419e6de44983b36
-
Filesize
5KB
MD5a0c4e43697a9723d5219bfd5ea1fdec3
SHA15d406794cabfeefc6a3a008d7a61033543b0e696
SHA2561288fda4ee2b3da7cc5247e93ba1af19b90f6e6de097ca3989a9a2b2792886fc
SHA5122b455a2d6c7b4de8afcd2e58abf8d41e751e0596dbfa293a6c958b112b153f6a97e8b1a198f01f871dbaa94a53e49ed914400c6b55372c3db407ea29a5a358a5
-
Filesize
173KB
MD52c365a5f7b65edb17d821ef73d7d07f1
SHA1ae310096d979abc67936b31c06d08e90a3c9fc08
SHA25677bcd876cc5a1f7c931eab11614412b007e7886d565874761faa94f7cc1e0128
SHA5124f7dcbd5b391418c4a6a71f35e889ef7221b028f04849381f5e7dc9cd99204ce28d5b03ee4ae2e22616907384f6b6e0db5c491219de960ec41a9bae0516929dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd