Analysis
-
max time kernel
47s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/11/2023, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
ATT89702.htm
Resource
win10v2004-20231020-es
General
-
Target
ATT89702.htm
-
Size
1011KB
-
MD5
39d0e993b6bd27555744202361761daa
-
SHA1
0f1c26fc512538e854e01f5121a8cc9a4161f82d
-
SHA256
8d76c1ee4b15e7113ad8c71baba07c16008a10348ca4112ed14fead6da0fed1c
-
SHA512
224416e58fd157a8a99ce537864ae1c0c01e0421c605781de1a9a1e62664c5ea9ab3da5dc8fbc10ba934be3a702465b6c457ffe2c09106a1a638022133a9f0fa
-
SSDEEP
1536:KHxHxBbOvBp/vRVutdjzSk4f08z1zia30Af1xdip2hQWxMZa:SpW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434847981390538" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 5048 2896 chrome.exe 85 PID 2896 wrote to memory of 5048 2896 chrome.exe 85 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 4264 2896 chrome.exe 87 PID 2896 wrote to memory of 212 2896 chrome.exe 88 PID 2896 wrote to memory of 212 2896 chrome.exe 88 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89 PID 2896 wrote to memory of 2224 2896 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\ATT89702.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8719758,0x7ffaf8719768,0x7ffaf87197782⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:22⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4940 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4592 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:12⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4680 --field-trial-handle=1884,i,15566049735705979559,15834262021769168230,131072 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e70e43ae257090826edbdb7e568b57fe
SHA1496dd8c9bff83295822ef0e7f501d97679dd17e6
SHA2562b4714db9f19025f8573817d5190f6cbcf55d565f2e7aa071d1a5bd951591f0e
SHA512376af1ba7931cdf7dd7dcc70dce1097b110702951c1ad0f4636291a037d2abddbdfae2544903c68152ab7d4e78c659e9f87b36d05e9fe476fec96590b2f1efb8
-
Filesize
705B
MD5241b8c851acb6ded1b35f4f9cfbf32af
SHA1c6042a925d945843dd8e9d68ae742bcd50013339
SHA2562633877174ae9a4c14ff1f6bda17c1aa39ce5e9f1322738aefb84c96294df969
SHA512557f5ba029f47ae891509e09016927e6996384423a3db3fb0b5356630cafa3ebba1035bf2e42ef5a53f097241352473fa57e6d1d0eedaa0d3ad62dc2802ea847
-
Filesize
6KB
MD580857bc7915bd3cd7d84b697b9a32665
SHA1c0b4a2ec4c9489581aac86a36ef722dc53187059
SHA256311f7cea8b36464dbf92e63aebc03116e4be5492119a8be551c3442a9d3f2587
SHA5128470cd943cdebf8f0153c9fd6b45510df4ea75a590eb05497f2a04185738ebaa4f6b51e1b1728126652f17bcd6807b5841e10e59f227aa6d1955a13fcd529735
-
Filesize
6KB
MD5c041a93f5a5067910f1250fd2a112fb9
SHA1f11e2d652f8537d77191deb4d93b60a7d36985f5
SHA2563ca117e97d3ae3714cad93321eb3ef95c2ad744fb637e294499d643a059453a8
SHA512c65a552a8c8e9f4c9c04028368afca82ad03afe27049d0acd599178529feb331fb577a09d09dc9e8b5a4d978f4b8da7a7df693c8a4c8b2397f493ff17b4c5c45
-
Filesize
109KB
MD5f86fe7551d9d32e58784c2fd6dab35db
SHA1f526428deec0f797174862c905249fa545230fbf
SHA256f98e33a8bb996a09e552f78032d0322e6f2bbb1663ca891fcb293433bab0a7de
SHA512a5f1e256ff1684850b2674837380d98a056f74ca0542f6129a368ea058e22ebeb272f1c808fc35b6445c7a40e6365b7d8c399395cd48f52e07c9240770e11995
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd