Analysis
-
max time kernel
15s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
Windows.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Windows.html
Resource
win10v2004-20230220-en
General
-
Target
Windows.html
-
Size
25KB
-
MD5
8b06504586555496b28399e63e113cb4
-
SHA1
dcf726fca3e6e36c3263442cb2c68b4cb7a85a33
-
SHA256
2a6e36db5965b6be081fb6f52b55d2aae936d225d9a610dc6f808a073e7ff390
-
SHA512
b9a3bb29225555ade2d26553f347730bec6121b8429ea027114675836b8fb799c2acbf5d5a3ac4f3ac8fe555cc50791aaaf300c57d36fda43d56f2189489f7cd
-
SSDEEP
192:ZPRzyw5XBs4nA0deSkm6Vw/vtuRzvVlItPbfPqac52Spc50zggKBf/:tA8a4v7BvwNvJn52Spc5ngKBX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133264071955671013" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 chrome.exe 432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 432 chrome.exe 432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 2828 432 chrome.exe 83 PID 432 wrote to memory of 2828 432 chrome.exe 83 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 1944 432 chrome.exe 84 PID 432 wrote to memory of 2468 432 chrome.exe 85 PID 432 wrote to memory of 2468 432 chrome.exe 85 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86 PID 432 wrote to memory of 1580 432 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Windows.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa03a49758,0x7ffa03a49768,0x7ffa03a497782⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:22⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4856 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1812,i,18278350959989047441,10806372100614502881,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5efefcf14798b0fc15929bfcd28197247
SHA125620fb3902682df1523a13fffc1ae02540dcd72
SHA256e71af345cbf944d915a19dfcee1d917a3b5186cc9081a4eaf964d7c195bca6a4
SHA512827729140d368aba18150d2329583cc45db0dcedf0dd7dc4750a29a25ad4b27b98ee89f9cebe3bd4486a0a23f47d1e168a197060d3f8601a613ea6e942865031
-
Filesize
15KB
MD5ddc580553404e53c07440f5838de2a83
SHA1b5acd5b55fc195c09d8d8fdcbd87aaa4c13d10d2
SHA256820552b0fdd1c7bba22e33708ee219cfa772830555083527b82097ba6adb076f
SHA51254d302868491a14c5f55cab230d92cf553660e749e607e4e63d0e209c8e33af86b99a306b6ea9bd53e47311a7f4e1d5f3f15228b1790fd2a7c2b136291fbac15
-
Filesize
200KB
MD5c59131018a7bcaba127e120428828ff8
SHA193d3a59963d24154a6204ac50470c41f1190a253
SHA25641349f11895680613b9d77f090871260e102b5b41d627b6c505c641fcc0dd1ef
SHA51261b2acee9ca78f327e1f273e81e5769043effa42660fe104f516fcf736ca64200fb14dcadffb3e4d7a282b81691326fe70bf712d508239e41723e6df20aea2d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd