Analysis
-
max time kernel
112s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-de -
resource tags
arch:x64arch:x86image:win10v2004-20230220-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
18-04-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
CAM006_20230414_501694497.html
Resource
win10v2004-20230220-de
General
-
Target
CAM006_20230414_501694497.html
-
Size
751KB
-
MD5
63aee558ef09ac38eacea9b4f2e46679
-
SHA1
266780f02de1edbeb773059448153dff2529ea9a
-
SHA256
689addad25a1466bfdd29651c13a344d20ee9d7855ae908c99b9c8d108947e06
-
SHA512
ca6783631495a354a4894b181e877d179106e2a1f1c716080438da05fb266c27d8ef9acd6b0d5a2ce7e4100aad7e0edd25c5a5ea652d73f8e13babd6079e473b
-
SSDEEP
12288:dKt+cONCmQ+fzVw0BgXPR1Opv47pfg+4ZIEEUTKK:ot+JCmQ+fzVw0cPR1wv4tcqEEUTKK
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 api.ipify.org 42 api.ipify.org 50 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133262853083385356" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1572 3408 chrome.exe 85 PID 3408 wrote to memory of 1572 3408 chrome.exe 85 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 1416 3408 chrome.exe 87 PID 3408 wrote to memory of 2664 3408 chrome.exe 88 PID 3408 wrote to memory of 2664 3408 chrome.exe 88 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89 PID 3408 wrote to memory of 228 3408 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\CAM006_20230414_501694497.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb901e9758,0x7ffb901e9768,0x7ffb901e97782⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:22⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4860 --field-trial-handle=1792,i,6891507448253615211,491175831685764875,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bda355fdcb4a52ad30c687ab48e4ce58
SHA1a8dd04e0691be1ea296eaa1d3cf18dc30ed70db3
SHA256c2f3e86971efec39e4c124192d6b0fee574061d1710d45142a289fbccc3d3b10
SHA51261b5efe2b66c6a3c82f5cd415e4eb4fd62ed1fdb109f442d41a98ea2c4fa556db8ae24f3cbd29d8bf3d0d1ddf2519c05526f6577b7b72ddec501851a8f49e7f3
-
Filesize
6KB
MD50cd026bcf84a940f10b1d24a19b586bd
SHA1c7db5d50d39486faacf2c3ee334b0ccbc5a62ead
SHA256b20b857ae894235d89a6822d8a101e2ace592b564dc15df357981d157cf1c71b
SHA51272f8cd1020b13ecde8f52014bc6f1c202c987f0c3facd03f8726278b9626c736ceff8954dbc217e4ecf19299c1cf77ec5d0e95df4760ccead63c10cce647b20a
-
Filesize
6KB
MD53bf4ecfc381fa5dabc90dabb98b99caf
SHA188e975cdf5202513e73a6ff2446015280fcf265f
SHA2562a6985d80c78138f7a4db2327fc0f8bdc6ad64e0d3be69b3db85e5794f38af8f
SHA512c33db3458d9af5e7bb9214f780e48874ee97fee8076dbd1c88cd2f4b76408a11c2a3928cd25c9fae336026c4dbe39c23172f68f1c6be18923bb35c310dc58967
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ee83d14a-f90f-4201-b4fa-253ed9bd41b3.tmp
Filesize15KB
MD551179b533325c4ce7cc93bb99aedb0d6
SHA15fe72a701f8ef614dbd8106e2a455ecee94f19cc
SHA256d18b72affaee9a93ebbcab1572a1033414c06c3e4378398613d83e10a64cb027
SHA5127574fd0aa4bec42482b3722f5446672427db6a760a3b5e6ff204599d7cc3886726df96f337c0810c334b283c9262b9452829276f1a4776a7ac04b5be824b4a5d
-
Filesize
199KB
MD54884bc2ad5c482565b1e4c81c27b5181
SHA1b88d72f9744ae2a8ba80bc3c821211cbc3d6971a
SHA256ea9bf3448604a97634eab3129c6628743978bbf2e8eedefe04919cfc9bbb4014
SHA51251bdc20dc79a0b3fd3426f7e74523037e6056230c2c75b253214220fa336057e8834613bea0f0eec31d9bd2cfb095b43e319f1e52dba19013992bba0f4508660
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd