Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
Please share your feedback.eml
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Please share your feedback.eml
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20230705-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20230703-en
General
-
Target
email-html-2.html
-
Size
4KB
-
MD5
0f802bad885f8c88b9102c625a937cda
-
SHA1
f3c89b83c5fa5fbfc8b18d280249c02b91fdd3f3
-
SHA256
ad4823373c582151a35264f79d8a75474eaef3f537aa4ab0171cc0244bb7ce7d
-
SHA512
62cb48980e4a74f46199d6c329982ba81d7682ccbc54342baac2394e64853568302edcbf5c45afcc31210ce721fb186363548e42f253d6a93b1e5429b7eadd9e
-
SSDEEP
96:tCMYLPs33rp7rVJ4WuudNczfTutTJ4WuOjWg1y04sJXWoI2Ig4movo9/:tWs3N7rj4kDCwF4Vq74oXA2IRmyo/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3152 4124 chrome.exe 80 PID 4124 wrote to memory of 3152 4124 chrome.exe 80 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 2224 4124 chrome.exe 82 PID 4124 wrote to memory of 4820 4124 chrome.exe 83 PID 4124 wrote to memory of 4820 4124 chrome.exe 83 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84 PID 4124 wrote to memory of 4852 4124 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5f5d9758,0x7ffb5f5d9768,0x7ffb5f5d97782⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:22⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 --field-trial-handle=1880,i,17655619459845972302,4000668711553789065,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e5af1c29e0117da0d408340dcba2fdb3
SHA16028bf50eb01cf621aa79b82c8be7e22ec0f4f74
SHA25635fa6d9b8564a978ba36482cf9f65998fdd49af0155bc947cd9a738f2a991567
SHA512dd6706ef2738646c7acccb9bad4e6634fee5c915a7280b263c0b534294e81f60d390c4a74fb3c7b34f1c40ddf536e8be925c52bc9d05e0e072a19873d25d545e
-
Filesize
705B
MD5df61201bc96bcbf31738b8239e19b5db
SHA18ffbd9ed719a34695523c49f968aa71668565948
SHA256b2857bd7610fd6283bb3db0f7128be4df4f13a8c79fcd47eb93508259e7a8dd0
SHA5128ef2c75fbbe9053ea402d4cb7d1d2610b981a8db6877afa3e9099aa418c3fdaae7787283f532a283a079b6c6eefe6e535c09fe1a72878cefe7f97ce809d66add
-
Filesize
6KB
MD5ce578aa9b930071db6ad744ed6385452
SHA1b591d87b6ca54b1d166bd7e873aa965d20340d43
SHA256929331e3303eeca7fe533ab9c55f9f8e2d651a81ce8e3f9bc9d8990991c0205c
SHA512ba13e615f9d26624b7f1aa693f4ae77a11cd802b1352d27823c2e6014b5d02e9501a499c0d26192d6a06a45cc1d0289de012161819b3ffc12f7dd03cc6a4878f
-
Filesize
6KB
MD5516005c7501ba18e1141555356cefa37
SHA1cb89584cc7a6069067a5c172133690791aa5e394
SHA256101956d532d09ab9b196d732899a7bd5472c2354803a40e9d8a3fb22bc177917
SHA5123a535d6bae0555bdedb137496e5c4fabf43008b7626053c6a6cef74dea300957ccf2e0aae9b4439a46520ced3f51c18ebcc9253bc5e843c0a22c2c0978099c26
-
Filesize
171KB
MD5d339d681a367f11a26599392fae23067
SHA1c25f9b1337531bca3d15ab46c1869d44e8e1b013
SHA256090436ffd48ef33db879f39f0b69171691ba5235b13fdeee3658ddf746395a22
SHA512471ae2a40736cf04386404a7da30554b0774b3b5709ba56bef825fa4a53e5ce24486da4f62bdb0aed4d12348a8d03d747c04d3d1c51446f99ae30c3933445db0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd