Analysis
-
max time kernel
300s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
ACRO-Weekly---The-latest-news-for-you.html
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ACRO-Weekly---The-latest-news-for-you.html
Resource
win10v2004-20231023-en
General
-
Target
ACRO-Weekly---The-latest-news-for-you.html
-
Size
56KB
-
MD5
0b962389b224ab3b285d6754d739034e
-
SHA1
59682e0d5bf74d84fdf98b8f19733b5d0b58d2bd
-
SHA256
64d534ec713658a3f8c6799c32378bece00bdc431a885144ddad7d5fe8795333
-
SHA512
a4d59c1746eed75429c6c13c16b72a6ae1a985cf11e1c48d45ae8ce94325a0a29927e091997b8c65a8545a42af8472427bbfcc36e6fc6bd4d979720743f44cdb
-
SSDEEP
768:zf9NHprkCbJvnXIaSvPYV+IoHnndAWcH/dfWou5oqC05i:RNprRp69R5hC05i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455578859866279" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeCreatePagefilePrivilege 1208 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 4896 1208 chrome.exe 83 PID 1208 wrote to memory of 4896 1208 chrome.exe 83 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 1500 1208 chrome.exe 86 PID 1208 wrote to memory of 3276 1208 chrome.exe 87 PID 1208 wrote to memory of 3276 1208 chrome.exe 87 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88 PID 1208 wrote to memory of 2300 1208 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\ACRO-Weekly---The-latest-news-for-you.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa17849758,0x7ffa17849768,0x7ffa178497782⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:22⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 --field-trial-handle=1744,i,2322022065350396913,598263559670229510,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51f079636389ef1c3702328251eb29679
SHA13a2378c3d5f7f0f82eb7c46170efceac36266096
SHA25684e0ed14a7090972b76e1a252c8dce5330cde755c941c63eb7128f07a7f900a8
SHA5125c653becd524475892a289216542bae288e001429157922df384cb7e398d8f4f7b644f254e7359ecb839678108917b9691d5c5e8c0087232708bf839df8aa2d9
-
Filesize
538B
MD517ebda286754b7e703664fdc1497db9a
SHA18449d93e104cf67edf554dddee3e0e9a75203ee6
SHA2566fd4b576a8149c51d07b9c587e2b4a4dae3b61ff73725f5cbf02c16875e3512e
SHA512d0dfc5e2b8caaea91a12b0e983879ff544ae4bcc59787db8ea5876d60706f0cdd3ee0833068e32d884bd754bc3a48ba3ea94679781773fac1da004ccf10fa506
-
Filesize
5KB
MD58a814d7214734d5a9c252468239ea764
SHA192c570807a108c17abcf0275d69fba269153741e
SHA2563850575f929c3a505fc68aab26935b7e928d28dbdfdb5c9de09189cb836115e7
SHA512ba8d9d6617636808a3af5f327ea9033ff80e4f6ffa4024d717e122bf14a8ad35c726d197a9cf5c5957724a9933b99f352663a5df8b7187b245d4485f2cf90c56
-
Filesize
5KB
MD5350325787ce3b6946a1e44a47392003f
SHA1c6f58ad7e20451a2eebedd669f4715fa3a225aea
SHA256c7ff39db822522a47a139d6ac9113e82f74c058f2f5c3661f7d4c9115c4a4ce8
SHA512a94aadcafe6c3752d450e0590b47831c6cfe811573378962d762fc799fb36271af0f755deda6d75c425dae7d7807952d5d467789ecf49e185a9b5e70d5376eca
-
Filesize
5KB
MD5e82bd60f2518f4344576ea28770305f6
SHA1a410f066d3ff1f52f104863fabe0f2a2961f8ac0
SHA2561cb4ade5baaa400c56f9299e94cba2a18a9db789d9c6fde3c5519da24551a5d9
SHA512a9b760891919c9376931d609952367de28840ba9aaf72c9745be3f532ab7df24c7aa81f7150647615065b17b566e7b6e1c37fd832b8673971b7dfe6e0a79d89d
-
Filesize
109KB
MD59b19c27e7760b6e411a960d3ddbb5900
SHA18c5c8676678408b3e5bf019fb4a7cd07890ca115
SHA2568214b12e33eb7db223474c3a533ebee2899f397775e264bb88a0e50c53e2425e
SHA512a6b33d3da13517179a594e1031b8042d2033be86fc1b1c709b19099caea1efb89724e5f8f0e0d49b513527e58a40fb0d68d9c6d21659800b981fbc854926697f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd