Resubmissions
07/07/2023, 14:53
230707-r9kczahh33 1Analysis
-
max time kernel
300s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
yuhq6yrdu3.html
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
yuhq6yrdu3.html
Resource
win10v2004-20230703-en
General
-
Target
yuhq6yrdu3.html
-
Size
11KB
-
MD5
8e8ed260e680ec2bc99782ad569ac3bc
-
SHA1
84c77bf9e4b262a41e340c385fe3909bd672a904
-
SHA256
570056dff6b337bffb4a6550700b936f07f81268a78585fd3de1638d2f2c6341
-
SHA512
189b3086004c3b8fc71b38ad5638cd9ba73a22255a6c7e17a9dad9a098252b7c9b6637471ca28eea78138915544995b1c036bb057b7076e9c3ccbe5d6ac6abe3
-
SSDEEP
192:+rDJrlE2kMs0pzkX0g08RhH7NP8wu6ihQmwC+/vZecg/7VkbCoYKGEm46YuqvGq/:L2cNP8smhiZeBT2+keYuqvGqbOhr/SAi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133332152240934461" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4048 2600 chrome.exe 62 PID 2600 wrote to memory of 4048 2600 chrome.exe 62 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 2484 2600 chrome.exe 85 PID 2600 wrote to memory of 4396 2600 chrome.exe 87 PID 2600 wrote to memory of 4396 2600 chrome.exe 87 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86 PID 2600 wrote to memory of 3584 2600 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\yuhq6yrdu3.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0e419758,0x7ffd0e419768,0x7ffd0e4197782⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:22⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4732 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3460 --field-trial-handle=364,i,2470053365999892448,18072650670488510807,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58d0292d9f061f0d49502c9db7353f8a3
SHA139ec001728bc07ad8b246e14588d948c25190379
SHA256d0a0e7de3c6379180c8e2e9bd5d98ae483142e697afef85e8afe4b88dfdfcae0
SHA51270f6206975321afe09c837f6f92f56e623efa9132b4fb045bc6c8b2383f7c57442473f128403683e428460b550b9bcff1bb8ebd3b1900d8d17e346d12870aaa1
-
Filesize
6KB
MD583c1a96ea514fdf288d660f731294ec8
SHA1fee9832c440aeb7eb2d8e0f7b42f805126fecb71
SHA256da513e5d833c5262ff7b02e128a1cfb3ba6733eaf55f7352d5a07e65a179961b
SHA5124127a6e17fa56342a8d8ba0c9f7c542766b6effb646eb9f6e47aaa833c54af0a49df3dac35b2e1ecb766a2dde346fb52982c37fcdaccdd48345bf9952db6fb44
-
Filesize
6KB
MD52abc8b194143a856e1de840096c04f0d
SHA1e0b48cc54b003ffeb6fdaaa847463c20377ce1ad
SHA25616f48db823171b27f3dd6da62700db6e7e4603fe97820594a9de763040e7c87b
SHA5127bae23f7b6b89dde579f3e4670c7c8dc959c3826149656e5ddcacddc8fd77337451ab2b82dd7113e2cece5f0922c9fc07372500d799d34b73f51907cabf57c81
-
Filesize
15KB
MD50ebcec079de79de1554b99f7d991f465
SHA118df09492c74de79da5d34fa3f0245c1cf6d60eb
SHA256b17e5447add0462466f51ea980849551daeb9567fa64c3d289243c76e4441828
SHA512ca3ee8ad18bd578a4154be4eafbed9026e3630c60dbf68a594aa799ea056fc769e71e75b105f03d6c9def0de6cd3307338cb77711574b7e2bba4def5b969bb56
-
Filesize
172KB
MD591b425301fd292cb724f992b82218f78
SHA19248c541563fff4d9161fff5e4fd11b2f346407a
SHA25653439cc4d462bdeb007962b730e9d01d48c1e41d10fbf6075c3f28fe705c4778
SHA51223d3070c1c588e14825c8211da8cacfe78716633102f2ea6e63d6997f1bd1625584abe7127d45876358dcacbfa907cd642a5b048660e255452d03e7984c5f5f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd