Analysis
-
max time kernel
1200s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
Na5w2yMVea.html
Resource
win10v2004-20240221-en
General
-
Target
Na5w2yMVea.html
-
Size
16KB
-
MD5
dcfeba9972fe726f9fe388b55c639236
-
SHA1
2f977890ed8ef8a1bd493c55d1a187ae613e19e2
-
SHA256
fba5e3b3b5b44bbcdc9d377a77faaaf8de55c71d7905b2c32e5465c1987f2676
-
SHA512
2eb0895d5280131e824255decc6878c77e981a1e2c27027cfcd78a2ec25a53567c406c62ccf2fa72cbe1f3eb40f049d90d4bd122bb735669df6e9d1bbe231423
-
SSDEEP
192:0JCDj2TRr8XeIFd88H0gFjwBr0yThrwSCw:0JCf0RGeIFW40gFwr0OhrwSt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532874449303161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4844 4868 chrome.exe 60 PID 4868 wrote to memory of 4844 4868 chrome.exe 60 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 3104 4868 chrome.exe 87 PID 4868 wrote to memory of 1068 4868 chrome.exe 88 PID 4868 wrote to memory of 1068 4868 chrome.exe 88 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90 PID 4868 wrote to memory of 2548 4868 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Na5w2yMVea.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfffe9758,0x7ffbfffe9768,0x7ffbfffe97782⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:22⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:82⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2600 --field-trial-handle=1876,i,4155535288074007858,31798943753199724,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD541fea78c34386ece94f92a45fe256f73
SHA171a9f72f79ed12c222bcf7e0a1f1d5a233438daf
SHA2569a0f9b25a1c0afe6b744c70e808a03bec4bfd6317ad0ed5717c428b2311f8a83
SHA512455315568e5ed6205416552b38ee3ad26863e70c2260c48220ee0ca438fae0c258ab478f4206aa6f38272b932b3aa98a7a11f85884aaf87ab679a002126232ce
-
Filesize
6KB
MD547ab6c7726ddc978d392b5dc0385d1dc
SHA107935ff5a187ddca1efba6be91f3d794bb165657
SHA2569b3ef4b6a7a8c24f1554203426b573b33c9271993bac052db6c96271d8de8ec4
SHA51290af9826f055b23e2e24d299a7020cb4cd81a9f8971048acebd06feaf044fd21955041b806cf136fd19e0ca1e8685e59c9585dd6ca58aca04095ac99fd777e72
-
Filesize
6KB
MD50d24225b2f50b6ba3a2759d3e5fe0637
SHA1eafaf151778c931358bc0081d909b7678edb3d00
SHA25617a4df75a7cfb8d968f52fded3ef9da1fb8c52c9ed3bf9c7b959099779a808c3
SHA512822614dca715834ea6fefe4f3aa7466e681b12130e328f0040765d3895df12241e667d9e9250c2257f44780bbe2fc214b74740b1238be8c943ee42d3a7b620d4
-
Filesize
130KB
MD5653fd218ae6209c949ddc403d94a52d3
SHA11cff9634e213f011ecefbb1b27e23ffd4a4b37c1
SHA25637219f59cd47e1a4a2ee2c173b649ec8eb4409d2c0e6e91beee711a8ecb58356
SHA51218f700aecde996df985002f902c3326b9cf347b02390b7ea8223a2a2178247818c5c36d4185ef11c867aefb673659c5058926d1319b1b02b412a991825c6c7c5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd