Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-es -
resource tags
arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20/04/2023, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
pipe.html
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
pipe.html
Resource
win10v2004-20230221-es
General
-
Target
pipe.html
-
Size
235KB
-
MD5
0c1218c21d5f03592d06789897947806
-
SHA1
b6cfa8fbb964c3049de005a5d6db9b69b8dcc3f2
-
SHA256
1e3521898a31ae290e25f2d4a2ab484a87e8478b3dddb1ee99591fcfaaa7d209
-
SHA512
64feff90f58b6abaaee5fd4491d5ae2ebb087aa688eac0d86e6d6f87be94b5b3d334c80f1248c8e20d0060d1232d0cdcfd2dfafd74c2ae8f3f0afc470bd017d4
-
SSDEEP
6144:zI7mRVyEfCAQ9GWa+0KL13gzAetYq/ynpUs5l3qhKljVy44LTkC91cY4fj2YRfo9:E5a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133264324894676535" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 2664 3384 chrome.exe 82 PID 3384 wrote to memory of 2664 3384 chrome.exe 82 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1768 3384 chrome.exe 83 PID 3384 wrote to memory of 1820 3384 chrome.exe 84 PID 3384 wrote to memory of 1820 3384 chrome.exe 84 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85 PID 3384 wrote to memory of 3652 3384 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\pipe.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9855f9758,0x7ff9855f9768,0x7ff9855f97782⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:22⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:82⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4776 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 --field-trial-handle=1812,i,13582145182325641811,18406354309632982953,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570ae61fdbb053b8af33ee393e159a4ed
SHA13d675a126618afe2f63186c136817eff93725a9e
SHA2567284cb714c11ce987af9f352aae0a058c2da347d22bf4ad22e3f4a0234bb0429
SHA512c8233af94087465ee28fe704328d981e16904d638bfdb578abb760ff8d844c8dfe3c38daf45327b169abbf7902a5d1441d91d5a7b7cf6d9f73334c6aacaf3997
-
Filesize
6KB
MD5bd2baf2a815b4397f415d2513bf21db7
SHA1e38b59630edb977546964caef60163b7ab3715a3
SHA2569844a4fa279c532aafb78d28e7b92c0b99c9a39390be07b796fcb0488f7e5fec
SHA51273fe5225c56a4b899d00c2cfce73506b4a095d3e3676efe554fd7ac18ab26d45da4c0c223318e499741064a43ecba85536ebfef17e79b1b5a3182d015f88ea39
-
Filesize
6KB
MD566ac8f0d3674ca30ebc98e4fef9e46e7
SHA1f9bb849f9927ebf79c31b4c77936fc29c3ce6e1e
SHA256b45fecdf028ca6b7202c92c653976b9eca1a8e5342cd94b6fda5a87e16df2b37
SHA5128c969ec3dd0116aee98e7fe4899ea66640d7c99759cf8b1796078400ec05d903065556f372e71365023b512fb35132481bccc0db626f6480773fad322b0c3f9c
-
Filesize
15KB
MD57025b13adec599c52ac7692c393522da
SHA143d878c0d45331c507d3a7a5af4c01d10069d009
SHA2564fc0b3fcda680ea912d39f7d5181bf99657af8ed28bcc8a72ae82599b5b91de5
SHA512aaf6666055636a3bd5d181436e7d704247f7078a31be648b7e86a33a5005269073b58c5f6d43d34f8be292b0653d5ae7431249ee288f0d8bedff536682c8f920
-
Filesize
200KB
MD5004b8f98f62f7a863ca32b92d8ca86fc
SHA166fd125e57cdbaf2112059a600575d8c246e6e52
SHA25626c338c899cee5efe751da6f01a811392e734a7369be81c9f43cd719f9f33aff
SHA5123f2f9b458dd239d343c699848858748d94011b464e7514951bd7bbc071e3129bf1341b5947c923b6dcb94d41e55719d81c58d22305a9a57365d4bce977b6dcab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd