Analysis
-
max time kernel
67s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230220-en
General
-
Target
sample.html
-
Size
6KB
-
MD5
7a6d69de59ba9e799f5e3df891290739
-
SHA1
a663176e0d9146d271c42cccca9a250889c85d79
-
SHA256
d5be6fd861ef338097b1586a7370243590acfda59e0be003afb170a547691843
-
SHA512
c730c0a4586a88fd846e69994c4a8170ab8f002963693c99e67a3202c6fd1aca56bcbd57b783d7f5e90f719aa6faf0a4a3b45d3011314f1f78047f0ab6402c54
-
SSDEEP
192:/JYliuFs23bgFTwvI9I5dR9KecKoeAfavR/:hWA23WMIa5sgA8/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290557644059881" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeCreatePagefilePrivilege 1576 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 5088 1576 chrome.exe 84 PID 1576 wrote to memory of 5088 1576 chrome.exe 84 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 400 1576 chrome.exe 85 PID 1576 wrote to memory of 4832 1576 chrome.exe 86 PID 1576 wrote to memory of 4832 1576 chrome.exe 86 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87 PID 1576 wrote to memory of 5072 1576 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b6039758,0x7ff9b6039768,0x7ff9b60397782⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:22⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1800,i,2182506975540549560,11075590610746335127,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD585098e64479ff395beb0b572319989b0
SHA1b1bb1058106996fadee87e602a1c613fc70d0351
SHA256be242cf2b15e9334791c8f1d2729092c614fbd5f20af5130316a95564fd552f6
SHA51255621f65ce10ae9745f74ad2cb6d81cfeeafe65a28f04b2f6c837984f2f4f44262d67afa07b09aead31cc267f1c37753252dedc5a580ef676c8ed6fe3a0d7e14
-
Filesize
6KB
MD5bc1df2a08e1b36720063df94b4858362
SHA18604303d47fad73c62ca3d0c3d9abeccefa738d3
SHA256c1310dcf5dca2d1c59b055c05debbdfd146ce170355b1eed1cd42b1ed620c9f3
SHA51206c9c027ee49cbcee43ee46d480aa5518f95da4bdaf8db168547ecd70e2e43d9871625def8eca88d5551f5dfd97aa203531f50f1b5029fccf0c2f1ec9257ec8d
-
Filesize
15KB
MD56495b760a661d2f60b002a9c9eb272bf
SHA196b37ccc533c766d638e9aad537b96d34217e1b6
SHA25625dc3c4b4cf6e09ce89a626fe53d95632440e6cb27069818c2adf7c9c8eb8dcd
SHA5122c467fed1cc006fb8a1a962fe9d7dc74064ca16a0e94b5014b71c521218185d362a3f6a62d803c89a3f48f792a9158775e1805ad3e6aff9c73f72a2c535d59df
-
Filesize
151KB
MD5f8d112ac458910583b1d7b599e42ce94
SHA158a6ab88badbe28db0f571cc46c89e462b644a50
SHA256d0a27a122da8ff2a732e775c66a6417b1b9d285a174f481e1dcdae7a72f7820b
SHA51265c4614b45e76a400d08fdae82e9df26bc24eabb70a4c7a781e3f9f059cc47f12f47ef0999e0349ad58bcfeec55a5fc4e70c250ae8c2532bd07a8ca9218463de
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd