Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
Your_Account_has_been_locked.eml
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Your_Account_has_been_locked.eml
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20230703-en
General
-
Target
email-html-2.html
-
Size
23KB
-
MD5
b78865d27654a0d0a9482f723fe2af43
-
SHA1
be9e94183cfe027bb082f09b8d2e802fd73a20f4
-
SHA256
02e4bff672fe5330dea32918eb8ba4aa5b74bc0f34f638e53ace02815cae807d
-
SHA512
ddb2f33afc2a7f0fec8bb665942070bf06511e3ffd1ce7b82320ac0db9ff9e779bcd535b887ec77ae15a88ffeb46a61826fcbd26155bc70354d30cc49effda22
-
SSDEEP
384:UsUeHzP+tWr/WVSWAvWro4A44hAT4UU4Lg464n5Knd1SsKqJvCeqW3cNi5V:w8FhQKndrJyW/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336543244815302" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 2812 chrome.exe 2812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2372 3596 chrome.exe 42 PID 3596 wrote to memory of 2372 3596 chrome.exe 42 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1240 3596 chrome.exe 88 PID 3596 wrote to memory of 1476 3596 chrome.exe 89 PID 3596 wrote to memory of 1476 3596 chrome.exe 89 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90 PID 3596 wrote to memory of 2396 3596 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffb502d9758,0x7ffb502d9768,0x7ffb502d97782⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:22⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3164 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1648 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 --field-trial-handle=1836,i,900251445877384548,10953501031657858046,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa6d1a38cfdc88ff18e5fd9c7ce2d1dd
SHA1c9e846a5a86704e041fb15978afdada3964bb900
SHA25658cef9f08b2d22b52da5fe303b7e51193d72cfa158de25522f0738b5512f4e9e
SHA51255d9c3b5a7d3bb27acc8d9acca560f1b07efb2a69b93a741842e55034a15dcf3002b8c06f3c0de6bdd7a93cdd464df645b044bc2d0a6b129bb399bd504555e77
-
Filesize
6KB
MD52887d577b93faca5d3430ee5354e7ec3
SHA168061c9038ca5b487c8ce3f266875a9af47391af
SHA2564fab1174a03ec746673fb282ad17099d030ee8f777e4fa19e00cfcb74bd9e085
SHA512eb7cde3237d544abf647181e6d91464af10c4c52dacc2ad669258ca682aadd4c8f71b8763e109778c9b193885a87b8813f732b4a08e850f05e11b48fc7012362
-
Filesize
6KB
MD58a82ba3fb8afbae4e036dc5fa13d0947
SHA1f51a6d4c09f0aa659c395422c761d7ad035eb83a
SHA256f3aa7e6fc06076ba3dd6f53dc303afd53a94322f89cddab4c303c80e3ef1d178
SHA512de2aaddf65e977c1e8cc0bd917d07e999a1d84c9067a2d95f8f73eee8c4ec703fc7273590f508596ae84050d3ae8587439155185eb0efb442c0e2c33c1e09827
-
Filesize
15KB
MD5d8531ea50718eec7313109886ee0960c
SHA10404dfa1f0f4013b1bc2736b7b786b4b2ae74093
SHA256f623f27218fa2c8df22513d26f74379b241e223dace7602cdfd865838e0a52f5
SHA512b2bb4d8f800a0f815707504e0335d3aacd7d1e36130c8df4da3f8b670cc234bf6e3ac235d00fd251c2a5a8506d059db888351662d6ec112cc545d16283894739
-
Filesize
173KB
MD5e79a07982ad07a705763971589a2d8c1
SHA1c3b16955d090a9f0ae3351d16a8e53900e7a1a80
SHA2568e0bde8a1b36e4f8c2928b96566e71a4e5990971deea503cd894835da6fa007e
SHA5126ab0e911fd04f6756be0fd21f60c39553d8319920b5f915bd0ffe791ffea84e00f3267433d1b7c0cc6ec1f6a693d5dbd23fc9f8c1236058f64103cedd46986fb
-
Filesize
98KB
MD50e09d7f97a9a0d54ba95201708463500
SHA184fd1489f1e5e4d8aacf454b9afdb8e50eb01129
SHA256a34dd6f80d0d398a9ebc59431afcbbafa42db2f3133eae1bd7a18494287c15a6
SHA512ebce3070ca1c0858c01308d402b7647572c9540410910bf7407276956c2d9a6a0ea4e8583582fe20dae709d9b4dcad3d547eb8c505429707678f2490cc5eee23
-
Filesize
97KB
MD5aeab8aa99f4f9d516a614a53f3d37f87
SHA1f27c8029227cf4c00acca4c875ba4805375d8081
SHA2561d82a8b81c6d7e7e3cba9bf4b48f4591c94b686b110fbb85e1d1f8397d938a1a
SHA51201d0b7debc3f844a18f912dc4c5e3442229fb1c9023b9f08f10ecce8c83377a2d3bfc8d3da66206fbfa78dbd95946e3f2b4b87a56246c33d2f9c4bcfc8df3f8a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd