Analysis
-
max time kernel
41s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230220-en
General
-
Target
sample.html
-
Size
8KB
-
MD5
1e2626b3de1fec643ea72562a00666ec
-
SHA1
0ef8b58e9061643056885b46d7e2985d7fe6eba3
-
SHA256
827384455b7f55529506f805f806d2276f72998e000ed3a6bd550208c6815df2
-
SHA512
c40863a9a8f333a9be0f99f32b72d45618b9c0b0e069332499561a539d94cef13ab62f29701e9001dfcd16e5e63f61db6c1ce149f5f3d1eb69c07d076ad9da35
-
SSDEEP
192:cWT30OJ1AudI5pvazASdxUBud6CuaMuAkIn6/m5OTvZNhDM:hy+AOxUhCua9ADSYuvZvDM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2024 2040 chrome.exe 28 PID 2040 wrote to memory of 2024 2040 chrome.exe 28 PID 2040 wrote to memory of 2024 2040 chrome.exe 28 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1632 2040 chrome.exe 30 PID 2040 wrote to memory of 1192 2040 chrome.exe 31 PID 2040 wrote to memory of 1192 2040 chrome.exe 31 PID 2040 wrote to memory of 1192 2040 chrome.exe 31 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32 PID 2040 wrote to memory of 1028 2040 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a99758,0x7fef6a99768,0x7fef6a997782⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:22⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:12⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1348,i,10230948782610870350,519190782972788917,131072 /prefetch:22⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
4KB
MD5e834f79c883ff545bd1e0875ca11f0b5
SHA100f2c38e647557428718393dafb5eec85fc9cba1
SHA25668c9de76cd8cd2a7ca7f3dcb3a2f2fee8c72b4cab434a794883e71bfe542598d
SHA512424c5a98bd8fd53e363416c1ffdecc6358300505fe70efdc434cd490ee8f53deeb6dc26ab0f84e91e61335e3b6b45e778619a177949386d403316c6504076af0
-
Filesize
157KB
MD50aa0ea83a23fdbc50ebd4b2d2cef4273
SHA1c5090c179a379f516860e78fc7d8e328b531783b
SHA25616ae93008513986e02153138ae4baa1e2056cdaafc399fd681038ce013186c43
SHA5129b94173a6a80147876fc7cdf932dddbcc21f7ecf6fb9c46355c1e2f3d8c3d6e3b5f58d0451a5b5bf3299f0ea0cef427bfa9e2feb3ed11be27716631042be3fc8
-
Filesize
157KB
MD59e61f864786d659c590b171dc8f21f7f
SHA174ae8c7dc0ec8026d0ab70437e64c785d2526d74
SHA256df1b51f46f33df14f1446abcc3b869c8117e722b25c6bbbba4d4e0b5b68534b7
SHA5127450af1c281d315087209206bdc59f14eed1cca1c731e781ff962e4f99601ea0f6e98e61e1c8942085f91cef83b92b48dcfeed111a392667a4a9446f36a26726