Analysis
-
max time kernel
1799s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2023, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230703-en
General
-
Target
sample.html
-
Size
17KB
-
MD5
ff68af7bb28e9d8097eac2f9d27fe6dc
-
SHA1
344ae60cb4d13dc2179cfbb1e225ca71ee356952
-
SHA256
31dfcb2ffef4a68ea15f0be3cc45a9aad3a00beb3f060e6e1fb873e37071247a
-
SHA512
3b9351f57daf2b4e13bab301e71d77a9b74235327ca0aea653963441f2ecc5a7842e7e7bfd8616182ea36e8ebe4840ed73aa902aeadb23e06704ff07d609a5ff
-
SSDEEP
384:rJyT/5FADpmRgVoOs41LclKjGFy2U8Hhhb3tX7Dy2sVa8BJCBXQL:rchFAfVoOs4xcISFRBhbdLKjJQQL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133345100711233561" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 952 3280 chrome.exe 40 PID 3280 wrote to memory of 952 3280 chrome.exe 40 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1980 3280 chrome.exe 89 PID 3280 wrote to memory of 1720 3280 chrome.exe 88 PID 3280 wrote to memory of 1720 3280 chrome.exe 88 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90 PID 3280 wrote to memory of 2424 3280 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff854679758,0x7ff854679768,0x7ff8546797782⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:22⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=888 --field-trial-handle=1804,i,5769598686621776430,13226431002697309792,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51bf9f0c729ef14fe64510b386ccb2cea
SHA1f5979245ca150cbbe015e8672fa2f148821c83e3
SHA256c5361a28818266c9cecdab4711bafd2f8fa17900dbd1a8b7f71497dd8db66adb
SHA51240edb5322bea2aa5c566c0ff31b4b82e450f00aeaa6d9d2622f6be8cc4325184ff118bc8163caa721a047d70bec3e588855e7835b8cfc537fd116ce6d7ecdfca
-
Filesize
6KB
MD55087eb902bb0e21e23510336852e1f95
SHA1b233d0d3052c78fcf466df7abfd88b53c8644b71
SHA2569ba88c54d084d0cd8c76d0b0b43cb279bacff92241e80182ac350f2652f668fc
SHA5124dc6204d8b51b6533c796445e2f42ffd47ed170b2ac1b26218cd353048ba90780fef2b4d0ef85ba0a16840a922255c6627e2c5024e93c11500ece477890af4c2
-
Filesize
6KB
MD5b0efe19508c4e94c8e7637646d6423b0
SHA14f73ff2089d4650f889fbe4674906d6132b0dd96
SHA25605bca1e62e3a7b9b4dd880e26d41987f75187dcb69e48d71b18ad6db5882b7cd
SHA5128401615c8d845533569b170fe4216da16c145dda9f5d59f25bcf303a31e35c64de1d65b4bb523129f5496531b9bb8b1ea83f887d4d781331df489c0ce5291d18
-
Filesize
87KB
MD5ff24c32edca64f415a56403f25e87276
SHA13bf9137f63f574df60aebeac149ee13125dc8279
SHA2564543967d1e6edbc51ca3a10299e4d52b97d773477648d53ad2dc3412ffeef091
SHA5129445370f7b1e0741c19b8a6cb1a3413903fc01e739cbc8cb86c48621baa6ce3d8a250d2405cfbf18f2c4f1eefa0640811a508546aab3b0ee670f9044541efd19
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd