Resubmissions
20-02-2024 21:40
240220-1jlmsafg67 120-02-2024 21:40
240220-1jc1msfg65 120-02-2024 02:30
240220-czemeaab24 10Analysis
-
max time kernel
1800s -
max time network
1692s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
20-02-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
1151459844210036847.html
Resource
win10-20240214-en
General
-
Target
1151459844210036847.html
-
Size
10KB
-
MD5
50167549707eea1ae958f0e6fc5ba007
-
SHA1
44876259d9f05757e3e3e925a95c61b47839792e
-
SHA256
e55fbcf3a2c3f8e4357084d3ea3fcb956aea4d402bee16460c52b4be4c373f40
-
SHA512
ca2365930605f23356007034cfaca32485e96da94c8be9e29692d99e6cd522510ed1f63cd27a2a501a267c17f184bba87d0c47b4ea9c19e67694327279f1c91d
-
SSDEEP
192:mMBp0Rr8KeoJDCFI08Eks+Fv0jo0yThr1SCw:Z/0RLeoJDCF8EUFoo0Ohr1St
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529389773490302" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3720 4644 chrome.exe 72 PID 4644 wrote to memory of 3720 4644 chrome.exe 72 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 32 4644 chrome.exe 75 PID 4644 wrote to memory of 4424 4644 chrome.exe 74 PID 4644 wrote to memory of 4424 4644 chrome.exe 74 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76 PID 4644 wrote to memory of 2356 4644 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\1151459844210036847.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe41ca9758,0x7ffe41ca9768,0x7ffe41ca97782⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:22⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=692 --field-trial-handle=1792,i,17419673764800677294,8061426112576869771,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD535521b3c3df625c8ff4773283b6cec23
SHA1b4b52767611b97802734cff34b6967cea5b1a739
SHA25688c38ae4750ab8e5d44b26b5a603b2b96e177864cd5350c632a715d057457f4f
SHA512aa8353bd16168487d66e75ff91a03861d56a97e2befab392431fdd325787be2cf917dc41c14a346b3c7b6b3b700a3fcfa68d7b4c368ba26b417797aff9a6690e
-
Filesize
5KB
MD5d790f598a65a6db41bd4b9c246ab535e
SHA16ea6e8cde896dd0639166f11ec488f0b2eea3772
SHA25613c12d167c9fa2e7ee63cfe69f25f619b8869f60b10602563ca3431352df7fb2
SHA512bf3962cc4fefe0bfc3c0e91165bb30a27598c64f7adcc6bd851fc35b6f8a87d7335f99353ddfb1dc7436c116d416c257fafe5a3243063fb8c411a564cb482c03
-
Filesize
5KB
MD58d26a51abbba7ae2e529707c77815ca0
SHA1d00b3c3f603a98150814a6970d0c09bcbdb37147
SHA256470f0952f8b0442bd14622fc7a62c59e605c318554a0e85b3a0823f6e4b934cb
SHA512252772e12dabb2bd2ef7558828164000906d6c69348f6578497da9db61465123e7320f9fa65d740d5ebedda27715df99724d1573b8694d071dfdc3267593ebb6
-
Filesize
254KB
MD55fe875fbe1a067a4614a9f3ba4fb0cd2
SHA11249ae8faf29ed0cd3c4ec2a90c07f6cb8db6c0d
SHA256856eaa21632f1025d23061a827ff513e865355262a34dfaa706c2ef3584c26a8
SHA512f53fbe6c43ca04ffc794320f0d5c51a838192730f7f181cfb1bf0c75861a1b47644f8d9628cc23ffb83fc6819ed5206eebdfe2c40d7921d817266ea71b249ca0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd