Analysis

  • max time kernel
    41s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2023, 07:54

General

  • Target

    sample.html

  • Size

    8KB

  • MD5

    1e2626b3de1fec643ea72562a00666ec

  • SHA1

    0ef8b58e9061643056885b46d7e2985d7fe6eba3

  • SHA256

    827384455b7f55529506f805f806d2276f72998e000ed3a6bd550208c6815df2

  • SHA512

    c40863a9a8f333a9be0f99f32b72d45618b9c0b0e069332499561a539d94cef13ab62f29701e9001dfcd16e5e63f61db6c1ce149f5f3d1eb69c07d076ad9da35

  • SSDEEP

    192:cWT30OJ1AudI5pvazASdxUBud6CuaMuAkIn6/m5OTvZNhDM:hy+AOxUhCua9ADSYuvZvDM

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a99758,0x7fef6a99768,0x7fef6a99778
      2⤵
        PID:2024
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:2
        2⤵
          PID:1632
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:8
          2⤵
            PID:1192
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:8
            2⤵
              PID:1028
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:1
              2⤵
                PID:328
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:1
                2⤵
                  PID:1836
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:2
                  2⤵
                    PID:2064
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                    PID:1600

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.dbtmp

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          e834f79c883ff545bd1e0875ca11f0b5

                          SHA1

                          00f2c38e647557428718393dafb5eec85fc9cba1

                          SHA256

                          68c9de76cd8cd2a7ca7f3dcb3a2f2fee8c72b4cab434a794883e71bfe542598d

                          SHA512

                          424c5a98bd8fd53e363416c1ffdecc6358300505fe70efdc434cd490ee8f53deeb6dc26ab0f84e91e61335e3b6b45e778619a177949386d403316c6504076af0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          157KB

                          MD5

                          0aa0ea83a23fdbc50ebd4b2d2cef4273

                          SHA1

                          c5090c179a379f516860e78fc7d8e328b531783b

                          SHA256

                          16ae93008513986e02153138ae4baa1e2056cdaafc399fd681038ce013186c43

                          SHA512

                          9b94173a6a80147876fc7cdf932dddbcc21f7ecf6fb9c46355c1e2f3d8c3d6e3b5f58d0451a5b5bf3299f0ea0cef427bfa9e2feb3ed11be27716631042be3fc8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\f3028ecc-b33d-40d4-8b80-aaa1a1376d06.tmp

                          Filesize

                          157KB

                          MD5

                          9e61f864786d659c590b171dc8f21f7f

                          SHA1

                          74ae8c7dc0ec8026d0ab70437e64c785d2526d74

                          SHA256

                          df1b51f46f33df14f1446abcc3b869c8117e722b25c6bbbba4d4e0b5b68534b7

                          SHA512

                          7450af1c281d315087209206bdc59f14eed1cca1c731e781ff962e4f99601ea0f6e98e61e1c8942085f91cef83b92b48dcfeed111a392667a4a9446f36a26726