Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
TRF38982_waV02983.htm
Resource
win10v2004-20230220-en
General
-
Target
TRF38982_waV02983.htm
-
Size
16KB
-
MD5
f79224554e4c4c6c13cab486ba4cf6ed
-
SHA1
f4a2b83a38f96200907da06305d8f70732c8fba1
-
SHA256
e1fd82d40ae6552507ba741d30dad91526f19987dbb15fb655e6ef6d06e8ccd6
-
SHA512
f18b362795ee9c8c96207c2bb8573fe29458e97f52ed7192eac0ef2b3fd854bcdd270f3e105587b31ad76cd8aba6c739bfa8a2efb6194c03baf56a3d5fe71f6c
-
SSDEEP
384:oOTpi5xkRYx10rK4A7NNCL0NxVHcKK+whvk+He8WOwb2UX:oCiLmq8K4A7NNi0NxVcKK+whvk+He8xI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263185573216484" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1760 2052 chrome.exe 84 PID 2052 wrote to memory of 1760 2052 chrome.exe 84 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 3836 2052 chrome.exe 85 PID 2052 wrote to memory of 4304 2052 chrome.exe 86 PID 2052 wrote to memory of 4304 2052 chrome.exe 86 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87 PID 2052 wrote to memory of 3804 2052 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\TRF38982_waV02983.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffede549758,0x7ffede549768,0x7ffede5497782⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:22⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3204 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3304 --field-trial-handle=1824,i,9386171627226741327,7229346756408417054,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925B
MD5ab3ef62307d58d9d7671ed7348b71704
SHA1224de512b4135051bf9131a0da22325544e438f0
SHA25673ea341991eb96c7977ab2ee567f3bcf9e7b75d39b8b21cfc832438e9b1e98fe
SHA5125bd95aaa961889c12db40c93fb6a0ae66b4a686ee5171bec4214bdafbe48fa57e4de722a7bdfa196d2dfce83a34a41d9d1f00f98711cf2ff712c16a5961f61da
-
Filesize
538B
MD5be69571b3bb3770d7a720fe27eed0267
SHA119be679610342cd2510ea4a6e131978b557d4227
SHA25628335a6f424e4dd99b69dc432c8830267bc7b050ccbbddeda04467a6fc44c87d
SHA51295f3676d4f6c11587a2ae34de4b76b04bca6c711acd0ba3d3cdce50012525bd38cc5e76771658fa67437fd26ba43fc938cb1a8c2314fb2432b90e1b3a22869d9
-
Filesize
538B
MD5ab90edf4c2dda83676e7ae5de864bec3
SHA1ffba4564c9b4f3e34dd2e74c5a568501e3612b27
SHA2567f551e3fcb9b11734933d6979c5bcce0c56ff4e3fe382a3f17025e3f80b280f4
SHA512bd466a84f19c4524453c2439e41b3087fabf487d5968b863b058c4898fb8055c556923260a49aae59d5325383ea82738dc3fd8f933c8ae6cb6056230b2164a63
-
Filesize
538B
MD5bd197cb55b283c57927e1fe81e77b1ab
SHA12bbf68bbfc1ce0309d97632ad5623fce6b1d87c7
SHA2569dce524a5dc5f6129a60f6d5330a434a6caf3f1b09af43140b1e731ef0eafc14
SHA51238ab58d86931e714892010fa8d161a9eba438b1e73e3135e86e65dddc380863a702655944efef5caa812f33e378f2c44d48f192229cf7638bf6b2f2a276bbb44
-
Filesize
5KB
MD5f2344ba9ea17e9aadc9b8485bf628c04
SHA1a557a500d57929fdd93bb7984aa212c0b8b88dad
SHA256e34244ff1f9a6614581a73406b32984a7f56bee40dd811445a7350191fe64744
SHA512791dd316c21e31f13e44e9076a2f37275e1fad70566881dabcead940a5b55e1ae33fb24e9a41bd053481db827a6ed4a56634523faf44b5fcf127e98512ac3822
-
Filesize
5KB
MD586781ded7394c6b677c7f62753e5a635
SHA1dccaaaa3ec92651726983da3dea42d70093c790a
SHA256f8d143276e96ab8bf9a5386073ddf98cffb4b04702ccf536529e5d1b1d8f0c1a
SHA5121d1a1b089cdcd56286df4a7670b5b99820f230c7a6bbb3e9ee0c22d3c82d2eddc3c414ab005fe6537b1c1d521801597b886975f2d8a1df9d61dd427149d3aba0
-
Filesize
5KB
MD572c61986fc00c375f16448080293bfee
SHA1b8fb34f782b71df7ba5aeac069677a0744dc3474
SHA256303f06e9c3886b893d06fd2396d33d2487865875b7a73ee181822d483d86aa0f
SHA512e9517dd10c63c6c0afcfabe8a62808afc918004f2f5dc4135b8f19a2ceba3fbbf8e037ece403ac7967241323971d99825d03cde63d62c9226202629b16f07fd6
-
Filesize
199KB
MD5c7102fef3de515abf273b4fa111c8779
SHA1378b235dfce0c849adc6cee23b6262c456611fe4
SHA256ca337e5ccf4d849c43390b0eb02f1dc4d162f7a8e72f712e8c6f2268dac98f21
SHA512f4fbcd06f648ad856cbb983d09ad39f8111a8c2f4bfde3d410ee5168845d726d723c9e55cfd7e0cb241029985d654d03b21ddec1f3b1be1ad53d43bc46aec8ea
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd