Analysis
-
max time kernel
39s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
test.html
Resource
win10v2004-20231023-en
General
-
Target
test.html
-
Size
665B
-
MD5
670cc0d81ffae722c1c428d4d649bf18
-
SHA1
31005ef4620567cdfb6ff7c03c51cea83ac2f2b7
-
SHA256
8166db881a5bd22d12627e41167e06d317d270366eed3ba1877d315a6d8cfed5
-
SHA512
715a75587b58eafd5b3f7ca8dd601890d38e141ed645b1860146d6cc176c03202bb2b04729adc98e5cff2d678c1bb9603b0be028b4193a93b55aece4bffdbb8e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449630863297224" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2756 2624 chrome.exe 60 PID 2624 wrote to memory of 2756 2624 chrome.exe 60 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 3280 2624 chrome.exe 88 PID 2624 wrote to memory of 2244 2624 chrome.exe 89 PID 2624 wrote to memory of 2244 2624 chrome.exe 89 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90 PID 2624 wrote to memory of 2264 2624 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\test.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a89e9758,0x7ff8a89e9768,0x7ff8a89e97782⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:22⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5168 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3716 --field-trial-handle=1880,i,1980766337697272742,17534358134947096596,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\34da27d0-f4a6-4087-aab4-3319236a4ccd.tmp
Filesize6KB
MD53e3a2da41b7da316fdbb97182c199fa7
SHA102577e4d2648c3c341b554ec12217e7d0e0074aa
SHA25603b95d27f36c453626a785c445da65876a668f1fc6204a6cb6a19fb642e74e1e
SHA512492a34ac5ba758ff32647ee61ff9d63541155d50864e334eb4f2866104f6f23cf1276dad46d88b580e43140831946e0bf753a4f147df20fac5b7ad526df4aa3b
-
Filesize
539B
MD5fe17c4ec2657c91178432aa4f35ac45e
SHA137c6d322718afeaf7369ccb8869207644d4fd81c
SHA2563744021065952681d3f6d4873017c05c6d9ac2b4fd28337c87f0efa2bf02ce7a
SHA512b2c1ce4d0a6a9556f3b4d40077517e490ea158cd75db06444569defe3304bb04e64de059430166c2823667847fcc31bcc0c47fa6f5c1719df7d3c68f6dc58e33
-
Filesize
214KB
MD51eb78f52ef033facd06970acf172ac38
SHA17d174581b94ba97f44887d79cc0ac766769ee403
SHA25630cf715c9c00e23c98517426a97f53d4202285ac11589d39fce64278ebbdfe9d
SHA512aa27f7e45ab522188c7feaf55636200e9b99923c7dacaee2993e3c4a4a134c66233f29e2b375e7641521532a8a7207714d0e434486835eca40f799bb54bd50b0
-
Filesize
214KB
MD5cc4905b25f519c573ccc3b8558d0398c
SHA1b7ce354e6a36444516a3e7e5bcf3dbb0c56b39ce
SHA256835fca32f37ba36147609c32230c2febf32e0612accfd94f0eebf1e4f54f7cf2
SHA512eea3b2a9586fdefb10db359a03392ed8ee0078a08f56c3352534dbedf5d46bbdd269fee3de4e68f297b6f90e4ff0ac77d8881f6129062232f4c1cf23984b6e70
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd