Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
url.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
url.html
Resource
win10v2004-20230220-en
General
-
Target
url.html
-
Size
1KB
-
MD5
a1706d41f94fd0df274b0966f0181943
-
SHA1
64b15edc5bcd8e104192ab77c99805d0a8789944
-
SHA256
c5d84ed7a80f956bac440975cd577437515300f230f39e9505b4f797cf31a6a4
-
SHA512
6c88b8c88a322520cd96be59a7c47314c1424237200defcdf3e0cfea97b74a9ba95dcbc1edaf3266bd01dd83af71e015e6b4183ceed9eaa8782902465ce7ccf7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133288745687650667" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1668 1504 chrome.exe 83 PID 1504 wrote to memory of 1668 1504 chrome.exe 83 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 3760 1504 chrome.exe 84 PID 1504 wrote to memory of 1824 1504 chrome.exe 85 PID 1504 wrote to memory of 1824 1504 chrome.exe 85 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86 PID 1504 wrote to memory of 2616 1504 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\url.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaf579758,0x7ffcaf579768,0x7ffcaf5797782⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:22⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4936 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5188 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3340 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4932 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4816 --field-trial-handle=1792,i,15600732342801765330,17730578242483277261,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\83c3aa7a-73c1-4af4-bcbb-05e23adf9005.tmp
Filesize6KB
MD5ed06c4873ea92b2ed8931a470bc9657c
SHA1f997cdd30d59ea363d1acfd02fea3d9b11125bb9
SHA256e594edeb8d367753df98930c3b7f4b83884a5921f2834ae5572bab4e0bcfb409
SHA512a86ac95804d304196f953bc5713d483ef9cd4da898f6de4330f691ab7a75c4d5cd465714deae11738125f3260e76ec04897c2b639ffc1f7f34c6aa5a7e5cc632
-
Filesize
240B
MD5e2c0e9bf287e5b2f2991b5eb6214212a
SHA1f511ee4f91acbaf8c078009fe73c95756e05ebcd
SHA2561c0b411ec5b16cbc6ee7a9c6378f7aa7651af9ca3f1847693218e678a8cc0454
SHA512db62c2671d19c5ed1bc77f52f6470c8acabef5b34c6bd50c5365a6ccf67c0dedd48913d52e96b5f07e6e6a95ac8ed3b77e7c4ab6f437560038bbe3af46ebabcd
-
Filesize
534B
MD53f03af6069e83b76cd2669804c604310
SHA1ab633bb8a9cf1bd644bc2964fa1e2e4c97937b14
SHA2563b71b7b8c86975f1c0d36eccf36da2f5db9be616d6af26f31cfb633df71da5f7
SHA5122734a0a203516004b9bc0bb63630c0e468630dc4cad0708de79d92645a74b36c325745f304675c3a7d47fbe9ec7301dff0cf6f2598eb3f38ebc3179d55b7ed15
-
Filesize
6KB
MD57a42858538a59b7e4aa04cf42a87d7f7
SHA1d4cc32e1b0542b6f4e96cb14013c78032cab5534
SHA256dc6b372a4e22c06c138d01aeefe3cf0c1fff0ab66518c5b544a25efc48a8648d
SHA512b26fab3c688738a419dde3975c92bffb5eca2284ea0d2627cc723326c6b8352be98d7507188aeba952435c1eebe79e2322adf02c4d8abd04f214c9c38cfeee91
-
Filesize
6KB
MD54c1a42c6e306d241be97e7199f1d2008
SHA1a9d72b06133323e307a0f1fe8ab717fca68c037a
SHA25640454f38e659549c0ef2ecfe223420c3ad48243275f561777b174d1b146c5568
SHA512541d5e29a4f1247756b19f4619ca79219bc382ea6b38d33d148b3ddb1abd8b552d18edf8e3a39e5d612e64f4fe2d479c5a51b5af05ceacdc61a48dc1004ba8db
-
Filesize
15KB
MD5c1b75441e24793f40d610cfe0793497a
SHA1bb47393522d6074f13d7b42b029c775496a6c176
SHA256e4fb6b18dc1240854f7b84c38a43515d334d531f58665a9715ec11c9ac02d83b
SHA51232a91fd5e56765aef9ee8386aa8183283e6dd9bb3556db10be548f252d7ad239a497737683e0f8b76fe19ce1375d99f5f6d6e46d53afc75ac3f28897f1368ca7
-
Filesize
151KB
MD52fc5308fb8717dfa161d0efba6d071f8
SHA1889d85ee15bc08de08d570ac256aec7dce51454b
SHA25662f00b29a8f3d6208fca095e70d6dfbfceec68e523937d3b9e238e27723ca37c
SHA51252af05e90f3f8587d84faf48c34a069d259f854a9a71bf48cec41805e69203cc992ff504c37da158cf898fc4d0aa70a569fdfb3ab032d76a9853c34e5b381b0a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd