Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
electronic-medical-records-software.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
electronic-medical-records-software.html
Resource
win10v2004-20240226-en
General
-
Target
electronic-medical-records-software.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552957697897214" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2232 chrome.exe 2232 chrome.exe 6104 chrome.exe 6104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2232 chrome.exe 2232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2232 wrote to memory of 4612 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4612 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 4380 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3468 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3468 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe PID 2232 wrote to memory of 3220 2232 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\electronic-medical-records-software.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc3e139758,0x7ffc3e139768,0x7ffc3e1397782⤵PID:4612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:22⤵PID:4380
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:82⤵PID:3468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:82⤵PID:3220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:12⤵PID:4304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:12⤵PID:3924
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:82⤵PID:816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:82⤵PID:5152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2656 --field-trial-handle=1864,i,11469450349906694329,4018509861864948613,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3400 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:6116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5606d20d408759c89a4157e5089ed9f31
SHA10d692107c99aecb070aeab6786328829fb3b386a
SHA256a41e5308aa05c5c126a3565d202045cf6faeab6e2e36f1d105a0b5d53e72851b
SHA512c1fb49e3b9660d6e41efba89582059037d8cb9f10f2219b1ea984c72bdb3ed95d05b238cb60dfc65ac0a539977d0674f35c0f6a99d30af65efc0cf969fbc4b70
-
Filesize
5KB
MD54ae238fb340bbc691c14cac8cd2d0cde
SHA1a627c6e9f308bf993417cbbc18815ebb7ae90022
SHA256156dd77bf2afa8e249522dfa4c02acc05dd883433d44bcb9bc0d5befe2b20273
SHA51214549d37911b5e83a3584502f9297b4eae77b765e575061de6a22b33238dd1b7e0b13112e45ddb1eceee0f128d15f215a3eaa8d765a0732c1ffdb5c64ac8ef73
-
Filesize
5KB
MD5d5cb7272315726b80055ce0770dcca9a
SHA1420d94fa77206b56311a193496f7c52bb0db048a
SHA2566d03c629910fec6ca10a93e7d0f7ba88551e044761a5f17adbc13af5c6e91096
SHA5126d77657da59367680ebe993c61e86192d842ae12f32f1404b57f8d59767422f0f59d13696574ba4552ac2cd7326b6b2f0864300a6f8f824935d31c3fde718c53
-
Filesize
128KB
MD58b479754a1e366abb4259b5e23474546
SHA1fe66d74a9c2ebf289f92c878b8f9ba4f7122158f
SHA2561696a47a34371b874de52afe1e6e6f53703cf54ec960d93a1a250c2174c24da2
SHA512902b6823ab76c6c4cad1e506cb2ec669b4f25e4802cbe5e16977be32977c10fecc3416d590b9bc03f34ecbf927c1adaf34ababa05da235a88102f3f13de0079f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e