Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
y6AiiW.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
y6AiiW.html
Resource
win10v2004-20231215-en
General
-
Target
y6AiiW.html
-
Size
524B
-
MD5
6046cd77117fc40cdcc98a0be402c338
-
SHA1
c8c01b453a8c6b832d62f031861f607d05e47691
-
SHA256
3aa1c56ced991b1021f5f365c3feb66881e4b76c6899db6fee905812db83d77c
-
SHA512
ca404979c64f55f64c1a247ef113991765c5903fadbdcf5169a86ce42df0e6783bde04d2c2b43b0c7b406836c509188b51485314b5e22572d34c4601cacad84c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512944729283076" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 972 chrome.exe 972 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 568 2136 chrome.exe 14 PID 2136 wrote to memory of 568 2136 chrome.exe 14 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 1512 2136 chrome.exe 39 PID 2136 wrote to memory of 516 2136 chrome.exe 36 PID 2136 wrote to memory of 516 2136 chrome.exe 36 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35 PID 2136 wrote to memory of 632 2136 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf24d9758,0x7ffcf24d9768,0x7ffcf24d97781⤵PID:568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\y6AiiW.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:22⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1864,i,4668966708130344781,2724765833139563613,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD572e837833aa0ea965f5f883396feb7b4
SHA19f456fb42bfc32c6c2a87d213ff1d26502bb4bfc
SHA25682ae46749c195fda16ee20e4b9010b5099366523d2c8139678a622038bb6ad48
SHA512a006a7e79612478fc74904ab01bdbe19e30b82a9b1fd0946ffc348225b2df7b17ff044eef5aee08372f09b031f8c85885a869dd3e9933e97bdae13a085300470
-
Filesize
6KB
MD5e640605087eeea2189128caa18b9b25d
SHA1a6f9aa6147548586ee8a8be68591dc0864d4ea2d
SHA2563c9a944104acf9ee39212eb8f92a2d5f6e36196b70dd1274cec9a8e1f3c4d586
SHA512a09922d646ab595ca8f664a4e2563236a0d606e5b7bfcf053d970153a5bdac9b62bdf900e0e8b0bc905fd676f6161723607e77781fbacfbdd15a420acc97ae90
-
Filesize
6KB
MD5c7ceea1935ef8b78ba6c1183ddd7e393
SHA1899fc71c2990e917c141854282a18b54ea189c71
SHA256e8ff936441b4aa7a540af560e9d6e35918369788e806879cd386d39768466137
SHA5125281e1a47fc1c91f480583b111e152e508fbb52a0f8dc12b6fa257f265d6c541a034e6a4d354db4bf4d7648c720301768261aace1c758540751585ea2e747cd3
-
Filesize
114KB
MD5ac1d091e171a83187305604785144f23
SHA1b99ff1eb36ca4ba3e6190a09e6421053bc5d14e7
SHA25666b6f2c9a218932cd5bb6df0f6fc7e764b5300570e6ae7197203d9e958fe8d64
SHA51269503be3678927197395f3fe6272c717628777dd1185809edd468b3ee98ee943c574f8175d80919eb3b4d85184cb5d7117f7d98c024952b068a49d1f0108d845
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd