Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
a1s-root1=email_banfield_2024_01_25_16_SMTP-att-1-4TLRgQ29l4zJmsx-2024-01-25T16_51_46.eml
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a1s-root1=email_banfield_2024_01_25_16_SMTP-att-1-4TLRgQ29l4zJmsx-2024-01-25T16_51_46.eml
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20231215-en
General
-
Target
email-html-2.html
-
Size
15KB
-
MD5
01627150ea7deccb38d2733a9dc96c8a
-
SHA1
ed7e3087128c57c3756eef2737cccf5064ebdd54
-
SHA256
61e4b36529a542d601b972729047126ee42ce0bc43090656ab9dfd2746e5a31b
-
SHA512
c033b2fb1332c3c4342788bfe3ab34c12ee9859f8348d55cfbe020128a51a8351542b0d80fcfa368568eaefa8636aaf1a159bb29804ce9562b87e46e59821b6f
-
SSDEEP
192:X9+qJPa+X2C9xuzIpYrVignH5hTd7vdwzk2usk9Z+dKAu:xJPZX2wxuL8ChTdBwTusUfN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506781910156250" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4092 chrome.exe 4092 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4092 wrote to memory of 3212 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 3212 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1708 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1612 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1612 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4116 4092 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc73909758,0x7ffc73909768,0x7ffc739097782⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:22⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1084 --field-trial-handle=1828,i,13268177420795010359,9891623739258633553,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5924e20668f8e441079ef3d359f6c9210
SHA136a38b9e52c8af107cc7f8eb4db300ed0ba056d6
SHA2561c089dea1757f9de4eba0f524c4f1dcdc9d32989befca378b19a98298b9a186f
SHA5122e21602f8e692f6ff31edc17ebdb29bd080f15b88624a158f40f67cb97eb988ecf8cd4944fb33bd33ea65c55653ad3a2e3ec1f0b55e74d5d7e67274ad1ffe025
-
Filesize
5KB
MD5a9af7ffd465d474f574aa25c766c93d9
SHA1247438fb3793253e535a05e8f76a5ade97f58a75
SHA256eed48c2d5eef7b43b347182bf6aaca7bdbbc59e0d2a11566b5e1eb33940c627b
SHA51221c174abb8a38876c4cbd10999cb4ea037995b79cb9c5107d58bd117ca743626a302ed3b3616cfd30cc31c2ab42b3e170def1df919dcea4541164df672e8d7f7
-
Filesize
5KB
MD5831b344ca8090accdd60b4cdd1f3f4d1
SHA145530f14644c4bdd91e80d3f8095a9e394aa32e5
SHA25661e317173af446d8606979a73f8ef8fbdda27f63b0685facbae5ca26089dcc9c
SHA51262f79b4c9e7d9f641acefa631e46a58476d173b90ced42c4814a668b63e45ddb76b3c4f74a3e9f1473eea701fd361cbbe3c2025ecf0a41d04170e83b4655a17c
-
Filesize
114KB
MD55e8ffc586dd85b216bf1461d7d6fbe8b
SHA19f12450a1ba16a8f95df6a6d193ab127972b308b
SHA2564e662d833efb09ccdade6500348251451c17e6fcb4a8eee885718a4c1b52e157
SHA51203e329507d7bb9b6a2cb9a30399227e1a0371437bca365ddc5c2dee6ba87936aeb6bf33dceb25853b00bc01bae00f10747dd40f4e8b7acf9c116c6e911c7ab9e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e