Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 02:37
Static task
static1
Behavioral task
behavioral1
Sample
view.html
Resource
win10v2004-20230915-en
General
-
Target
view.html
-
Size
82KB
-
MD5
ab7f11357c04a635c7fd78a0301b46c3
-
SHA1
efef1b0f197e74713bc11df982c0309e1471e270
-
SHA256
a2ba71fdf623443c8ed9ba8d4328b40d0b06c100cb706f3896b9ddea46b9dcb8
-
SHA512
6fd4244d02308d8214d071079722f4cddfbb478cdce4ddf6569fff4d2d43e75c6880842ae3d4b1ba832809eeaaf35b984cf27a3f67a12d3b747391b4a924f98b
-
SSDEEP
1536:hxWhjJWtS27jr8muNBMKob/ZwCkXjW9+1Zq7:hs0ZuINUK7
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133414654983690264" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 4316 chrome.exe 4316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4908 2284 chrome.exe 69 PID 2284 wrote to memory of 4908 2284 chrome.exe 69 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 1032 2284 chrome.exe 87 PID 2284 wrote to memory of 2616 2284 chrome.exe 88 PID 2284 wrote to memory of 2616 2284 chrome.exe 88 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89 PID 2284 wrote to memory of 2092 2284 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\view.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd91d89758,0x7ffd91d89768,0x7ffd91d897782⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:22⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4456 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4680 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:12⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3880 --field-trial-handle=1904,i,10730244636989549566,2811922391502206117,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD530ee8a918b5268ebff807831a16640d0
SHA1601c44738058a866f4f1b080fedef34935195289
SHA256bd69723581ad3f6f9c08d3b6391d30da263fbca9045a1b44421e3e9733904332
SHA5127b5d7e3951ba9fbeed520d5819f1a80e18c9cf1e487afabd97e77667da06e43d337499e875a71360db61b4d6f0ae98c674de131b728db42633e55de2a60eadb0
-
Filesize
2KB
MD55bd0a91883b8b8ddbbd54d2f0750837c
SHA17a2367e4a94fef5785ef0219170d76b0463bf666
SHA256104d827f00b7daabdbf2a4857d558e42cf74e44b31250748ecee479df664635c
SHA51282d4e30feab0723ae77d433beaf2b0f963f2ad4ebbe788a936bf72cb73c60e1909b9a8ff2c47efad8f928f389928a11e4722cf38bc22a5763fe8d2e90552cb36
-
Filesize
874B
MD51380669f34b15f8b1d6690c8aa4cc841
SHA1c03fc9d0f519407865f09a92b2ebdcf022c8818a
SHA256d266100423fb5de77ea258002b122c190a75b524952ab2ed03a3e8d92bd9ebc0
SHA512ed366ba117fec479ebe242082127af556fc40e6c2f8f30517a702e15561fbfcf04cfdd42aa3e2b81e78be3bde9a56656c46ae8e45be975952c60db26a881c266
-
Filesize
6KB
MD51b334a59c775ae38c86f84bafa0e7659
SHA144d9e4a915d4a8b74aa40f9b1fe09a758433564c
SHA256647142e2826f415e3769be58d3acf65e85d9e5ee8c61bb45c835260ec5340703
SHA512f2a92fba5da3cc697cf27b003bc995024037fb23b2313f523b5e639c2262ed906faedbd38b0401e1443217a6fbc4e9d77016f4026e1906241c61a4f3415c7d75
-
Filesize
6KB
MD583ea1379fdea26499003e0375c9d7beb
SHA112d6812e47aebc199396f05ef6631bbb7f2cff2d
SHA2569112813aad4b8039cf6afa4bf37dbcd28043467db875ebeedfae1d341fe8a76e
SHA512f7f99733d028fdff6ffa2cf556a789c0f7c99d522b914f9d3ec6095dca8a143400f22e6d90689b79279daed08458e6aede7512b6fa6c9ef18f971b4f6b417341
-
Filesize
101KB
MD50cbe99237c79bf055dec88e6083823ae
SHA1888dcfe0c0768d01ab4b6758130d666af54b2f39
SHA25652b450308c0d29bcdc11367a5479b29ee8e1d363838d370f5f43076fcedc4d68
SHA5121f6c67d517d3aba5da760b24e9c362941b4c0e1fd6cba110321a6bc6544404aa9aad30a2106c1a6777fd71e6d9813081947d0d6fb2414f7770c58315372cda64
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd