Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/01/2024, 08:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hub.ehi.com/docs/DOC-37598
Resource
win10-20231220-en
General
-
Target
https://hub.ehi.com/docs/DOC-37598
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4692 2772 chrome.exe 14 PID 2772 wrote to memory of 4692 2772 chrome.exe 14 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 3308 2772 chrome.exe 23 PID 2772 wrote to memory of 1988 2772 chrome.exe 22 PID 2772 wrote to memory of 1988 2772 chrome.exe 22 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18 PID 2772 wrote to memory of 1420 2772 chrome.exe 18
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xa8,0xdc,0x7ff955d49758,0x7ff955d49768,0x7ff955d497781⤵PID:4692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hub.ehi.com/docs/DOC-375981⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:12⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:22⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5080 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 --field-trial-handle=1776,i,15998881444963101179,2470295160849740465,131072 /prefetch:22⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5aba3286838ba6504d8523e200e3b4eb3
SHA182b61476da43982e557c2479e2881773dbee4eab
SHA2566c4aa2683999bf196cac7b1269de9e53dbc8381116b51597ebef2595b5e672bc
SHA5126ef7906709493fe4e8494847d465f5dfb44e67f234d36af4be99c40921bf3d659bfdc406a09ebc14792a5cf148c6b20238123a478dd14ff4ea230b69b3d8a3be
-
Filesize
866B
MD5a31450e887a75ec178060b4f8d2f7561
SHA15fb67e9fa3ae677dc2b6d77d45dcf1c3e8a1ff1a
SHA256518939791966fdd256701fbb1d59c3e89eeeb8f9377291cf78446219179bb9bf
SHA512d93fee611cc2be9b498116f606c31d7088992be0c76edf096e6b37d5435b0ffd2de5a49f02184b4c2a2a3d564ad2d71be2df7a36f16edd77393c02a93f197d92
-
Filesize
6KB
MD5c9edbd79b0b6af90032812209de96fde
SHA1470d2f198d5f683d97879637ed49dfdaab01a7f4
SHA25653163c80b27ad506a72e3b16b50f694d4298e8d4ddc58c4c24139457dbe86435
SHA51238f4ccf4bc34acaadb9397807a3d6a793d189b182690d1a4025bf3789bcea1b6798aabf1a37cd057bb4b98b32f0862b06ef6d6bb829cbec245bf6f1d235aeef3
-
Filesize
6KB
MD5a09a1e2291a121b82baa4a5773c3a867
SHA1bc2f4156e986185e770e4cf4b56e89db411d53d6
SHA25650ed6d164742c01e711d18d8b3bce38db4b9b0369035143007514cd72538bacc
SHA512b9fdadd782da59a7409b1a2440fbdee0d89b1da9f756656b7bcdf35b5b1cd22d41a6eca0dd289a0d08791c60c37b4d8164a78e9a3f45b47bdd6ee0f651418d22
-
Filesize
114KB
MD57567014ed393ef5f4d9ead9a7978060a
SHA1835a8e4a7695377558562743240b34f05a6271b8
SHA256a0705de0ddf8449615e803c66b08274e8f9886d769bf520bf4df9968936d80f1
SHA512be16ac0ccd57db79c88a3a7ec0ec7ef90228d764bbac05ff5859b1e04732f2535f176cb01d2b2452eafaf32b1d5fef18d7e560365af8b2864c4df6f86943f767
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd