Analysis
-
max time kernel
31s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 21:08
Static task
static1
Behavioral task
behavioral1
Sample
msm-tll.html
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
msm-tll.html
Resource
win10v2004-20230220-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
msm-tll.html
-
Size
77KB
-
MD5
514a25dea0489eb779532a14501decc3
-
SHA1
5582ad04a440d1edd7639107d81eb60b1074f1f4
-
SHA256
82306687a56d90b011838f0038eed28634f6208efbfe62c8ba25e76ff6a4f0f6
-
SHA512
d10412918c8d38211657c904d836b73c587bb43210061e00711d1f205e6865c9a97adb1c77a08628a34ab8f24b624241b9984fe57c451c0d682d56e892590096
-
SSDEEP
1536:ogrS1qAkoHRwfiih0cNa98YY+o84E89unIociK14ASi+k3:hVjaih0cW8wo+8cIkK18iR
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1784 1912 chrome.exe 84 PID 1912 wrote to memory of 1784 1912 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\msm-tll.html1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6b1b9758,0x7ffc6b1b9768,0x7ffc6b1b97782⤵PID:1784
-