Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 13:29
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230703-en
General
-
Target
sample.html
-
Size
17KB
-
MD5
974a8a8d01c8235b51d9aa5cb94e24c9
-
SHA1
3421d5c5df6eaedd831f0b4482d3c773a53bc23e
-
SHA256
f00fdb583fcc681e0998cb1f28c1fe8c7a38c8144bd6ec08295bb1f9523a77bb
-
SHA512
f7028ca87ba0fb729925171f9a77a9553b040901ef1523247c2b890ecfc618bbda56479cb8ca8c795f40d49601e69fb808f74f869775acdf77147e6bc86bb109
-
SSDEEP
384:rVOZVDpmRgVoOs4T9clKjGF8BU8HhhbE897F2sbRK/BJCBXQL:r0ZVfVoOs4JcISFiBhbxtdgpJQQL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338150071141170" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4640 chrome.exe 4640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4516 4836 chrome.exe 57 PID 4836 wrote to memory of 4516 4836 chrome.exe 57 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 2900 4836 chrome.exe 85 PID 4836 wrote to memory of 1028 4836 chrome.exe 86 PID 4836 wrote to memory of 1028 4836 chrome.exe 86 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87 PID 4836 wrote to memory of 4636 4836 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe51b69758,0x7ffe51b69768,0x7ffe51b697782⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:22⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 --field-trial-handle=1692,i,1528604634510190635,10070140040971782717,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD536d568ca7e1d1e0dcfee92464366e254
SHA1a6f329819299aa0dac3e8dc1eda6c003bfe5bfe4
SHA25662bff8da32f99124acb7b592b472c9d5b60becc0db065e39fd52e36317a9f733
SHA51263cf66003abf58069d5c27c2eeca6d2b6a6ca2141470dd71c4af9fc4592e780dcb4ccc66239204ba7581c41dce9d8d64b0c71cb510897d0c94eb24c9c18e288f
-
Filesize
6KB
MD54b76a9d2d77542d10f0ded44884d691d
SHA1a72e5815e64de0be755b4db0ccf403cf66ce8db3
SHA2561c4cba361df9fa36028782b53cf6bae8767f1dde9667c909e338273a98b97f31
SHA512821554c0676e36827805eadb7edbe36954e39bb2516bdce6e89d37d12a2ae2275bbb8d2d197b2e6e1b69e49726af088ddbf5bd21f9eab0759b7688a56319e1b6
-
Filesize
6KB
MD51fa6f7fd0df72425e4dcf5bab9133a7a
SHA1f4e53018eaa02cc0b0edf9c89bb08cd8518cd2b2
SHA25618325b10b56957264cf6da126bf82f257c735ba4e647607e1590ede0bd19f787
SHA512ee122822575c241ef529b257d63e2f362fc4635898202dff3db91087bb20923248a41b60ec84fac970bb35a62df61109a8c0e79051bb088e104d091068c68063
-
Filesize
87KB
MD5c84e6bfb6d8753ed74e7558b1eca2d94
SHA1a447a785c242b3c1991b059623d7c42cb42a84a2
SHA256aac33c38e906c7c5d54241306880df124ac021890631575453bbfeb9cb3111a7
SHA51243eda06435e378329a99e07480c59dc27c8faa6c2d33a0c0eb43499dea07fd84fc7450156506abcb95306e246659a42678655fb1e4b825214e14dd37ade100df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd