Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
01/09/2023, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20230831-en
General
-
Target
sample.html
-
Size
389KB
-
MD5
978281016d67fb8447f5b8d4bf1ec5e9
-
SHA1
e19567ee20a992ca5283e388382c12c2fa12a48b
-
SHA256
9745793addd880cf79c6f8d72c1913a7a121ac2ee3b9c46be317fb29e9b1aa8e
-
SHA512
d309e110773380b0f34661afa39c898354a12d34a1ca9213323b13cced07a52cfec371b5a61d345ca9dcb0ca9b121b294a34d785a0349b998447b82492d457bf
-
SSDEEP
6144:ZFGLPH8U3cc8T5DsB/G5SpFcEn7g79VjTH:oT3c/5DsB/Gdb/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133380720723867690" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4408 chrome.exe 4408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe Token: SeShutdownPrivilege 4408 chrome.exe Token: SeCreatePagefilePrivilege 4408 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe 4408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3980 4408 chrome.exe 69 PID 4408 wrote to memory of 3980 4408 chrome.exe 69 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 4216 4408 chrome.exe 72 PID 4408 wrote to memory of 2620 4408 chrome.exe 71 PID 4408 wrote to memory of 2620 4408 chrome.exe 71 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75 PID 4408 wrote to memory of 4552 4408 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9619e9758,0x7ff9619e9768,0x7ff9619e97782⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3600 --field-trial-handle=1832,i,1535078236063177005,12682809182852428162,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5db94def28ab9b6da85d1bb9d0a75c480
SHA12fb5a8774e248a69d5cf760ff74b8260fdd32ca5
SHA256100115f0b1ccc6ef2c2df8aa5ae540d103b641234a8419b24c380c7992064f34
SHA512c15b1d1e33a4f5ce9137fa6e49968c39dd6dac19aee69a5755e6f25fed76d51438b71d5b0e9fe2c4884976321a381f754fca1a1597845b0cc567ff77c4f5529a
-
Filesize
539B
MD5a16936d989021dc5e7588097038e83e6
SHA19507c49ee0996c01160878b064f49845344ee6f2
SHA25657364814219e740f1bd136d8a63234ab6597e8123958bbd4091de352f940e889
SHA5129fa4deae43d7591db0e3fb25917b748d91f76db49a102ace093652a7f6601df36341467a7f4d47937a9a5de5c1cbd05bd5bfea880281fafd8bf431bf41337b7c
-
Filesize
5KB
MD58608320cdd026853d7f294d28f8bb157
SHA19d7ab3038cefd3df00bdd2a12d267f8b51accce3
SHA25614a54c13821433125109fa9371cc5de1d1c9260f329cbf1c6ed460a5e74725fa
SHA512d354087ce4b98e5c8df816b6531dee9d937e558e84858bb3808b935ade79769b9f7b7ecb84075edb4f90740e584062cd736d0ad2be29e0aa36465946d01bd89f
-
Filesize
5KB
MD585c2f2395e552691e374cfc359ffd1ec
SHA136a639299d830424ae20940e607d887436e498ee
SHA25682a499ca114222f4f2149500d0648fab5a24b92884e82578dbdb38aaceb17b65
SHA512434e09ef7fd6ae3ac2257e479defe3c35c3151468aa2b90baa47c098ece93e1bd49bf593f29fb9377209591b5cfc506f2d2192a8b93f12d28076fdfe19a33af1
-
Filesize
5KB
MD568d472f99411efa1b6318db1fae00aa8
SHA10a3f421ddddd99141c4f71f7dc82a40f044f774f
SHA256098ca2ad71f48cebafb812246abd8c00317612652144f41faf3409eed3f600de
SHA512ba93d46d1830a057ff44485ca3eb4e9b551655116135b0e26a4b688f6cbb9fdbb924376749201d86239d472fc7ca43cc374f9a79fa4d4bfea477629ff0700464
-
Filesize
98KB
MD50063fefafb753c6816185142be509669
SHA1b0fefa35affcf80873586f35c835b6dae64c7587
SHA2564596b93b286ce2d8f1e3b1e25b85d2877cbc120a1953116cd0541bb425c6adba
SHA512abcb55ae47b63b453fd72583cdef8a2e5c7882efa13e0efd4497252f1857bf77629392e858df0ad18c323b8e587d9ea99e728285345d48ddc547b45690d2b258
-
Filesize
99KB
MD5d4bd5e3eb3ceb9a941644b49fae033f8
SHA10285b8692f262472b9b54b4b70ab03296613af7e
SHA256d32629bb1d6969ad22846643bc0162215f58e9958ebefd5628494714bb43c72b
SHA512ff3b8a24109ef89989550601e3ca6d5659bba581120d60ce0d857192e189ebc063a0c22b66c664cba75c8d0a4f334f93c90e79b703a863c44b1d976a1e16077a
-
Filesize
98KB
MD56c71667f66729b4e54e861aceb215b3a
SHA1280464597d2c197ce86315cadb1fcfa97076cdf8
SHA256daa12a074fb47dcfd395cd4474f9d1a73c556d8ec117a2819bda63cc7484be16
SHA512513174c4d7ed2723aa3425074f17e30aaebc8c96efaa408931aed32ce2ba875f2a69305de8c858882f249c09015c5b2d249b0d5f94865fafe569d01f3e0146b7
-
Filesize
133KB
MD5de495f5ac8420b23aa9cb84f878b5005
SHA151597b92bc3f6344e4a721f7b552faed86746c9a
SHA256fac6df39a6135ebd05a29d22af25df36a0eb9933c0e10b8d17b9b70d461cca0a
SHA512091fb4cbd7e44e931b9db1b3a4bd1980e6a532d24f5b3873bed63a24cf0460f9830b14d26d7d437b803cc17b6f4069f63c3887145d668dba29c16452644af31d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd