Analysis
-
max time kernel
19s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
INV#41 February 2024 .html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
INV#41 February 2024 .html
Resource
win10v2004-20240226-en
General
-
Target
INV#41 February 2024 .html
-
Size
164KB
-
MD5
57c7ad8ffc126fa86a62ebb4b030920a
-
SHA1
d7380117b16ca38e94a58008b3e3938c0441196d
-
SHA256
02d3776eb189dde9efc5183b20fd99be81c3c2984d733ad0b224dac48ed90cac
-
SHA512
ca1731464fbdaac136ca53c93c70cd397d1e5c49fffebe719e54a7f698ce25709a4b79cb0e6b3557c45806c2cc6c7c93b6149f5de5b8452fdf722f49646a3c8d
-
SSDEEP
3072:PGKrgwso+Q92A7QmZ+4o2qB1+Vi4BfKAJMqXDvPBWKssBqJMyUd+uflJ:OW7bZ6qThlssBqJM1llJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1712 2320 chrome.exe 28 PID 2320 wrote to memory of 1712 2320 chrome.exe 28 PID 2320 wrote to memory of 1712 2320 chrome.exe 28 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2760 2320 chrome.exe 30 PID 2320 wrote to memory of 2600 2320 chrome.exe 31 PID 2320 wrote to memory of 2600 2320 chrome.exe 31 PID 2320 wrote to memory of 2600 2320 chrome.exe 31 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32 PID 2320 wrote to memory of 1984 2320 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\INV#41 February 2024 .html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6859758,0x7fef6859768,0x7fef68597782⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:22⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2108 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2116 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1556 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:22⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3492 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3504 --field-trial-handle=1288,i,17635958979425065284,13533779763949089933,131072 /prefetch:12⤵PID:304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4727dff9b6fb8f35475d0150717c9a6
SHA1c40da79617f56f5833b6e33e730e18a98fb88d5a
SHA256c9e70d2d18ac50f9a2df70aca9f776e3b9a1b9cf97e030e91c74d451a1497c6b
SHA512fc5baa2e301d6f46ee90a5c98ac59f3a008559467b34c7d9b957f4eb6019ac46773f0a0012cb98d0377fd53c8fe34c0d51163e2dc4819702a73f1db7a9097b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1687b87b964e2738b65147acca35da
SHA11d90bba61275b0595429253da49c5f8a099ea6eb
SHA2567394f2de991c41270d2f674ad9570baeba7d20784da0f881befc15cc569a4a49
SHA512ad22ddbdb4d71ba9dc3932af77709bdc7657b677252c24872e0350715c81fde80bb8b944079d62e9c28e5b6fd837683102b512bace762040ad444e59650b777b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b86fc5d25040246b28463622fae8b3
SHA11a5cd0aa1bec34db88a25577b2e1de5de01cf68c
SHA256951149bd69cd1d74ea95d9b6f8332b1de1187c79f6c401d50a92f1d4dae55cac
SHA51270cc464f3b86fd5a44831677d0a9824926cbdd97c7e673bc84a53e360742bb8d189ed47a6636a2d6734f28bd285bf9c92e446b245582ef14bc12cd8656ee84df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b15db829b01a73c0807997bb9def6fff
SHA1243c9284cb34336e9359f77a20804f2fc74e33be
SHA2564432c3ee923ab80994b811298f9c3a55704b5d5a5ffb0cc6078ab00f5124286b
SHA51266b2b2afcffaaf211eae71b47d3e6a3b5f0e7e206dcd57a462184b8ef4f319bf8a0e5a9cc5fdc483cc141cc22bda7ea925cf0e1b28c8397709930961d16ce70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862e766d1ea2423d86db146202c9ecb7
SHA1ff14ff1d5d9a14f335185d93cd52a1d72d9e2a1e
SHA256f8d7233d78f04cc082d5f86dce14e7c29e6c50a3f1ca1686a29c5658db8cae0f
SHA512df152ae2b685ce3f628ab17d1b362d5b3e1ee588cc2623b6200a8bad7c761a9feda343178f3411c35d77084a0986b8fd0375598bb06f0b94526fb4fdaff76f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca3d8b9b4eecd0b35896f4df63d2ac8c
SHA1626fa3f7108fb1d48fe6dfbfd1ab8955603f284d
SHA256c5051a8bde8f07415cc6b6d3037cf5130f1e73f6499d8d81c687ac6c080309dd
SHA5129bb2e846eca3573113a42afc2a9571761d43aa910d4d961fc98cc6540446b95451e443f0c116a43be4448ef7fe1b9dbdf1020a6b71c4ed8b713e1397e05cdae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD53be5eb109c17ac8a859be264b9656ddd
SHA1f137ad2361ab6ba07c52d40ff1dd547ece319de8
SHA2564d19c90b88778a0a4530dde5a4a8cfc2e3a838576e28e4fbf6e016b9fd4d5fb4
SHA5125b8fb930952eb4f57dcd1a0699626b0651f202ed8112a75fe0aeb5db7ad256e667012b3fb6fd045b51cb35079a5ab3a2d747a8a6587f1bc6637760c58331420f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63