Analysis
-
max time kernel
1199s -
max time network
1085s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20240214-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
933c97b5057b6bbb93df4007746e5c55
-
SHA1
324ebacd7a2ff5a1890d14aea86b9d691f16ae51
-
SHA256
b9b7a66fc083def3912be9892d36a4fd29a5c438c3fc4dbd2dd4079f326b6d8c
-
SHA512
58d2251b9a06ded2807ee2648c1b33533add3ffc68dacf859ee6e1ccd50b75456fda236e79420dc4a30367e8ebf7819490906664ac67ee5f1f58fddd2fcdeb0e
-
SSDEEP
6144:2EMiEMsPRYvI8YtZIjdLG7fAvlaay3qOeMWfv0jP1:2EMiEMG+vI8YtZIjdLG7fAvlaay3qOeI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549671968002955" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 308 chrome.exe 308 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 308 chrome.exe 308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 308 wrote to memory of 484 308 chrome.exe 75 PID 308 wrote to memory of 484 308 chrome.exe 75 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 928 308 chrome.exe 77 PID 308 wrote to memory of 4976 308 chrome.exe 78 PID 308 wrote to memory of 4976 308 chrome.exe 78 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79 PID 308 wrote to memory of 3020 308 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8a77f9758,0x7ff8a77f9768,0x7ff8a77f97782⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:22⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:82⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2456 --field-trial-handle=1836,i,10740566793079814740,2448743774519829242,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b76d2ed3cd03bad6c1a4ed6461315f80
SHA158c07b0b031efe8617f37f9e510dfccd94b43d46
SHA256d80ac19adb2549bce7fa57048c897a9ed0e78651d92e59dfdc9aec6016bb3701
SHA5127b5ff746de68629a342cfe0e59ab3b37374a4c97b55cf09dd5d2da69a5142aedc0a82040d5c7018f81b40b8501ee1efbeb2d8f773b7719e16891121c75808a32
-
Filesize
1018B
MD5dfbf05a36fac16c3819ba5ab2718008b
SHA13cd2108c2571873e83e878d9b72e25a6b085424a
SHA2562cd2dcee4019245eea6fbef23198424ecda73e5e4bab5e5e43a98f2a3fc1e3f5
SHA512c1c33ab57504cdf7a64cdff5c57009721da805ead5dd8fbb9bddc218a90b5335346831854732ad9912d66794c1afcba569e19ebb118705567f8305c6b13acdc8
-
Filesize
535B
MD532e9ce2361c354ee83be620ef7e216b6
SHA1543ce5113559ec4a4ce98eabafce28f66399587c
SHA25673d6cccf7fefaaa31773d75fd3de923710c7d01baeb9a73999d9d3b017c44175
SHA512fad2c79ccd59575f2b504e86dbefa44e67d38eff93e366bf2b3f81eb62af187679a74a1055f3da1dedd1a0c5e441717e6bcbfd95e5466c1023a6fa1f619172dd
-
Filesize
5KB
MD5cf43fc8fedd3d60ae38935c23a891211
SHA144132f6425b3309ec856580e1c67c3ccb093b423
SHA256805d913c8c8a75a10de7e41c49feb6005a33e53047e561985127b427794ae1c9
SHA512eb816b7e5e89ac83ed6bc284559a853bcb32dde7e7ed964256df5445e2cc057ae6947a8730393b00cf4572642ab30e1d05ccf3e374b8e07ed5d802b13e5745aa
-
Filesize
5KB
MD54010bdf3e7d2c9043f0cecf95293439c
SHA1b7aba80ebb0094ce832b2a76e0cd8e88bec9ed51
SHA256b96091eb18a36915f5ec216f1bf3581b8a0eecac6ac0373143a98f8203da2b73
SHA512ae91af3e5c15e25211fe9cc60928323e010048538a6dce1ea0c80cdf71647e08f4b0e2c9131f5c227e32524c196d9d19b812c91685b314e96654824459149774
-
Filesize
5KB
MD5f5bf01d4d2c01e2f6ef1c547d5abe511
SHA190c1b5acd51937bad69445160754604c0eb55df1
SHA2566c959775c4c2fb49818e1e74756fb02fe87b3981da6dd33ac29db3a7f44579de
SHA51279f1cf9831002090d9fde44097315be5c9369666dd4e579f278f2320f9aa5e3a1b684d6166e94d6c3912943da806cb213aabd202813cd71ccc2db7b9f67a6e79
-
Filesize
5KB
MD502c929be3bcc24ef76769d57fc8272aa
SHA120a3e89b3ff6eee1b6163600b637800c9a43cae2
SHA25652d2fb76954a8d1b4f43f79c0345ef51518154a3b8c713da74e575b0f472d7a5
SHA512cf2a7eb33c43379394ff27f408013bc666ef68884c4286d6c5430f18b6694f7406409d4c24767b6b2d934af4933f6b1a0780f53ff48a987c3c30b9730a7e10f4
-
Filesize
129KB
MD543d1b6f9e32207001a9f264767ad799c
SHA1e597dc569594ad997d678a2535adb6b4ead427d8
SHA2564b6a0ac3139f6bd3c153d6f2515914a673e099347895ab00035838fe8c5231f9
SHA512223f55c742cc5dfa916d983f6e6041f8d7d2b1b5bafb1cd24c3f010248653fe55e5ed8b42743d27a44e91189ada87cb78ff574a4ce65732bb34f96318e25c7c5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd