Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2023 09:03
Static task
static1
Behavioral task
behavioral1
Sample
6126.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6126.html
Resource
win10v2004-20230220-en
General
-
Target
6126.html
-
Size
12KB
-
MD5
b2c16cb8c21e421a34f675751e2433c1
-
SHA1
315620ba0f7dca0cb3f187112791519573c7b113
-
SHA256
c8820f6834a21b156b19de71961670b43b4220413c92839e17dce70abf7916a4
-
SHA512
99ff6e9a8db9d1946bdd3961879c3777695b3eaa8e9da81a92f43344a8ae797763b62e2c0428f7f351e342c717f018bc6f4abf385db1688a3d26206f64038625
-
SSDEEP
384:n8ZZZME81uE1VhuY6wTn30NggQSuS/4IgdYfhFRTWdxFw3z5liS:n8ZZWE81uE1VhuY6Gn30NggQS0Igu5Fn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133308614596852680" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 3760 chrome.exe 3760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2372 4976 chrome.exe 84 PID 4976 wrote to memory of 2372 4976 chrome.exe 84 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 400 4976 chrome.exe 85 PID 4976 wrote to memory of 1856 4976 chrome.exe 86 PID 4976 wrote to memory of 1856 4976 chrome.exe 86 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87 PID 4976 wrote to memory of 3904 4976 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\6126.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d6a59758,0x7ff8d6a59768,0x7ff8d6a597782⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:22⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:82⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1784 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1016 --field-trial-handle=1820,i,12318793972682109646,17439653003459410355,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD584ab9614a2568d4211db5de62f2eede3
SHA183cdd04ccfd60aeb4d237d0db02e48b6239c7564
SHA256056845e09cb166a5e0441ba181b2d65706355db492222c19f14b3c4048af6f79
SHA512f1678a06401896d7adec477ff46046a007ce7c3c4d5f995838490258774d1e4943b4cd38a64d40ce41f17ab45f116e8d7331c239416b274e4558ee1609b77acf
-
Filesize
2KB
MD58d116bd6eb6239653a8890d621b40dc6
SHA19d1811bca9ec854652f5f995500385928e10ffa0
SHA25628041ed22d9faea5b008471dd166a470e26bf492271687d0dfcfa64a8c05d3ae
SHA51238a83783507aa3a8704c78fe33464578020e196512104caf080cffc123fd25360e9f351e37e2152f03ff5fabc74040b00d5864839e1c46dcbdee7a3d86e371e9
-
Filesize
706B
MD508006527a4f27f279174926f21ed12f3
SHA188df9ec6375bb55586bc27c5ee74df2c12c51b53
SHA256ed96a30171e3e59d5d7d3cad5dd268b92a8e180734a2163c5dbf8d8ada961d19
SHA512d8c6765e636aeec9e3601bef9f406cf37f66ed4aa29fdb16431d692f10206b2547bcf84ddfca6255dac599ee639fff074587a45377850f0bc57876383a29e82a
-
Filesize
538B
MD5bbdb3ed4428c252b0481a2d3c99cc9ca
SHA13ca1046d8e17bdeaeccb019294f41f76127d7154
SHA256674d9e3a45a64f1664cdfc61ec85cb3778a8aa105db8a5e9abca32dbc7beff26
SHA51214d350667e630d9e0730afb8c774db2f56c192ea2d6e41f1bccebb7b2f377905dc7007869013d405873931d71e038a7b17d7d0855debdcafc1578b9134286e41
-
Filesize
5KB
MD5345699670ce7fcafc4791996e88cc56d
SHA151ad369aa2316a4056c54398788014bc9a3176f7
SHA256512700324ebd290200aa0743650de965e14bc0d9746b64d944df59acab2c757f
SHA5121a00a76f72d677ba6c77876f205695e9d2710a492a7f2405cecd4ef0a9592d1124f68257f21c76f7631b43793c9d938dbe10dacca284126f30ae2626edd3f52b
-
Filesize
5KB
MD515f001eb3e2103b660aff5c0d8bee1c4
SHA135ad8739d68defd20a40a8496d81c2f2d345b470
SHA2562b5438f827261829a3ac2d6c6d80f377a8a1ca99820bd529171bb4868c777c8a
SHA51205c4872f83e4c73176d8b445bb426eb7a3c0da9838b7fc1627303dd5066d534d4bbe4498ee1b8328a3c0c08f44a4f2996f34b0594353e93226ecb47406eb3ab7
-
Filesize
5KB
MD5249047ee55cc9f10d5724dc25b0a0d2f
SHA133e4ff3763b7fac9a06284676b7a791a3ebb7622
SHA2564d83184dd218c177e2224c61c76f1a496610fb42d66b372d920e081721f6f47e
SHA51252b639a7e84a93cfea3e762e0450a38e54bddbe515d3d9a694b21b4c5cb38e1092749c40c171df90952687df61a2f2c44600baa04dbef3d7713d85607eaec732
-
Filesize
5KB
MD58e85cfd7a6c0112ec02ef255d62a14ed
SHA1443645947561eebdc176fa033f71181c88d77d9d
SHA256f3d22cb79d9ea305efd20ef7cae24e01997c9dff824db5bab178479000acbb28
SHA512e5a6cf485ad66b1b1e6a0be3ab55aa12da361a4242b1ee5bf6db8948fc81edc88ded10069ee365460a413fe6eeedadc46945a37a03174cc3070922c64d03970e
-
Filesize
158KB
MD5a9d01f492d4f2aae27f304a0c16950f5
SHA1e7cda5720afdcbd8f0e1d051ce52fce06b7d7481
SHA25696fd85a5d3cd0bd687c28d3d35ecca19d1332be53a18b152a28f577548b4034a
SHA5126666eba31cf57922e3b9ad4db474da915d4c50b714bc5e60168d3b26451c0b7e7892bd25ced5afe3d3d077010be13f31fcd120849c001991eb7e37c372acdc4e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd