Resubmissions

01/02/2024, 20:54

240201-zpv8qsgccq 1

01/02/2024, 20:52

240201-zn2dcsgcck 1

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 20:54

General

  • Target

    y6AiiW.html

  • Size

    524B

  • MD5

    6046cd77117fc40cdcc98a0be402c338

  • SHA1

    c8c01b453a8c6b832d62f031861f607d05e47691

  • SHA256

    3aa1c56ced991b1021f5f365c3feb66881e4b76c6899db6fee905812db83d77c

  • SHA512

    ca404979c64f55f64c1a247ef113991765c5903fadbdcf5169a86ce42df0e6783bde04d2c2b43b0c7b406836c509188b51485314b5e22572d34c4601cacad84c

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf24d9758,0x7ffcf24d9768,0x7ffcf24d9778
    1⤵
      PID:568
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\y6AiiW.html
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:8
        2⤵
          PID:632
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:8
          2⤵
            PID:516
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:1
            2⤵
              PID:5076
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:1
              2⤵
                PID:212
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:2
                2⤵
                  PID:1512
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:8
                  2⤵
                    PID:2228
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:8
                    2⤵
                      PID:972
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:972
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:3172

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      823B

                      MD5

                      72e837833aa0ea965f5f883396feb7b4

                      SHA1

                      9f456fb42bfc32c6c2a87d213ff1d26502bb4bfc

                      SHA256

                      82ae46749c195fda16ee20e4b9010b5099366523d2c8139678a622038bb6ad48

                      SHA512

                      a006a7e79612478fc74904ab01bdbe19e30b82a9b1fd0946ffc348225b2df7b17ff044eef5aee08372f09b031f8c85885a869dd3e9933e97bdae13a085300470

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      e640605087eeea2189128caa18b9b25d

                      SHA1

                      a6f9aa6147548586ee8a8be68591dc0864d4ea2d

                      SHA256

                      3c9a944104acf9ee39212eb8f92a2d5f6e36196b70dd1274cec9a8e1f3c4d586

                      SHA512

                      a09922d646ab595ca8f664a4e2563236a0d606e5b7bfcf053d970153a5bdac9b62bdf900e0e8b0bc905fd676f6161723607e77781fbacfbdd15a420acc97ae90

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      c7ceea1935ef8b78ba6c1183ddd7e393

                      SHA1

                      899fc71c2990e917c141854282a18b54ea189c71

                      SHA256

                      e8ff936441b4aa7a540af560e9d6e35918369788e806879cd386d39768466137

                      SHA512

                      5281e1a47fc1c91f480583b111e152e508fbb52a0f8dc12b6fa257f265d6c541a034e6a4d354db4bf4d7648c720301768261aace1c758540751585ea2e747cd3

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      114KB

                      MD5

                      ac1d091e171a83187305604785144f23

                      SHA1

                      b99ff1eb36ca4ba3e6190a09e6421053bc5d14e7

                      SHA256

                      66b6f2c9a218932cd5bb6df0f6fc7e764b5300570e6ae7197203d9e958fe8d64

                      SHA512

                      69503be3678927197395f3fe6272c717628777dd1185809edd468b3ee98ee943c574f8175d80919eb3b4d85184cb5d7117f7d98c024952b068a49d1f0108d845

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd