Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
email-html-2.html
Resource
win10v2004-20230220-en
General
-
Target
email-html-2.html
-
Size
2KB
-
MD5
6772a15da68e72135deeae9a17513a82
-
SHA1
d74c9f0156cc42ece9897b0adaacc83daa737d2d
-
SHA256
a9ff3de36e10e694367a308bbc60b2b118a42fbfbe8c31b9fd7a30db71ec6264
-
SHA512
2b403aa7f3bcd38ec449b0ef81d95c47177c700644b2031633cd744e331f9e4c6a63f89160ed3820cfe40aef1017202963f11a33a295102577dc31a4bcac0037
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294107863435580" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3260 4876 chrome.exe 80 PID 4876 wrote to memory of 3260 4876 chrome.exe 80 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 3116 4876 chrome.exe 83 PID 4876 wrote to memory of 5072 4876 chrome.exe 84 PID 4876 wrote to memory of 5072 4876 chrome.exe 84 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85 PID 4876 wrote to memory of 2588 4876 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe08399758,0x7ffe08399768,0x7ffe083997782⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:22⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1824,i,12923483033102462455,9166956203307830866,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD505f118af4d46ce639e3557a114481c68
SHA1c73acc324547f0461144ce0dd47bfc3dc7b1fd02
SHA2565a3cfd24dd079d46d0daf6d81cacba4c67759ea9a7c793590f6f75d2b91f4f9a
SHA512b0c2b664e596b8cf29bf053e5ac444df764ea2fcfded0f5af7a8682434a9c0647387edc07c441af38dc1552c86a9ae2750b96df331aec4ad498d167668240722
-
Filesize
15KB
MD53a6cd79c8835196193088855cab92806
SHA17e5fddd87d52c77f41be9930a78c1cb2b007f7fc
SHA256ad2dd843e74fff713c51153f469d418a17bf1abd970426a007e1e09f668434dd
SHA512fb762b95332b03b5490c4dcb53b00d29a27eaea7546878ade1a19beb5256e30480d3233a69c13e6001abe7d4f70bf446010322ac615cf917eff8ac361b25b6af
-
Filesize
72KB
MD585412ea44837a119199ddef69dc60111
SHA12773a6b573416b2ec8a35b7aff6e3cec37cd0d3f
SHA2561b4a17bde98332fc60352c022a5d0693318b8eb21dbf445fe9d39cec57ad6e95
SHA512f08dcba6d42060d1b516955ba4257d7826664d34fff5de96e5480054f74d25314669434f9fc89c8f59395f81e46a48d45e684ed7f9898ecc21d31ad6b2d143d4
-
Filesize
154KB
MD59c6589a9e8f856edd13af8f08ae80d3f
SHA18573df816c6fee8fe104ef6922148fb108bef8a0
SHA256751a4d1913d471f7e124618d36224fabd0ee3981509f6ff75c5de9e0b36e87e9
SHA51277a4030df53f5caee6559060a2f139cc6c999e56e4d22a84300ddcb38b5e5f1236603041d9b638c062bc4a267f7f8909ffdddb967882b8a7afe8613d76d837ad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd