Analysis
-
max time kernel
1800s -
max time network
1695s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-03-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
winaerotweaker.html
Resource
win11-20240221-en
General
-
Target
winaerotweaker.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133555222951331906" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 252 chrome.exe 252 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 252 chrome.exe 252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe Token: SeShutdownPrivilege 252 chrome.exe Token: SeCreatePagefilePrivilege 252 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 252 wrote to memory of 1164 252 chrome.exe chrome.exe PID 252 wrote to memory of 1164 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 1148 252 chrome.exe chrome.exe PID 252 wrote to memory of 3832 252 chrome.exe chrome.exe PID 252 wrote to memory of 3832 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe PID 252 wrote to memory of 1228 252 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\winaerotweaker.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb74369758,0x7ffb74369768,0x7ffb743697782⤵PID:1164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:22⤵PID:1148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:82⤵PID:3832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:82⤵PID:1228
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:12⤵PID:656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:12⤵PID:5004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:82⤵PID:3540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:82⤵PID:1968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 --field-trial-handle=1808,i,11879997381974265279,17306860533683631260,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5246b7fe272f94c8855578444c4e22779
SHA1636915085d37ae3017699c6eac9ded2dadd8a103
SHA25633a0f9a631af220ea4d6d6b094f8debbc67c0a70d0011b1808cc879bad3324f4
SHA512f8bdd144bd7f43cfad04db6b68bc4aa35afd7eaff640bc7ac39c3b9c49f8b635e118a07519fd720f35c6e3197d8e6b4cf0108d40592b669b22312ae7f5d6c18d
-
Filesize
5KB
MD5be2948489c59660df2bb13a34142666b
SHA1c5a9b57566bbea5c03148fdda2c9ec53a9679d6f
SHA256815b50edc2210ebfd4bf11bab1d400a7ab463167e88b5ae07dcc4326b306187c
SHA512c0baa4e236bc339318ddabfc2b2cf67c7f9a18aff36219193afa18f62678b4c8105e4b7c149ba1e81d1cffa54f1526bf1e836dde7a34b94dd9dae526684be548
-
Filesize
5KB
MD545af5ff4675ef0c27360ea472e8393f6
SHA1f40588f935b09ff850500c3c79b4007f7c7b30e6
SHA25621642d2f5d5af93df81d93d6b8c29967ad041058c37ee71324fa450b17a7a787
SHA51255344a896e5b3eb80bededddf4e29847ba7b30be15e2fae8d9e519b8e358fb65b375acb8ed1fda6ed08919c5d250db44c074bc23d6d021190d42e5836fdf1cc4
-
Filesize
129KB
MD5c0e79141f39227221a7eb204016ad2b5
SHA1f22e56714e0af2f089d9870d44192426c82f3618
SHA256c779a13bc0b248a83cb8755e712ba056b796b0bad546672c3b330089bca1c887
SHA512044260c1d8e97a45bbb5d4eab90cfeeeb2a6cd7d89d66affd1afc68289b4e13466361c30d89b6e189f0584ef16be939332f8b9fdd9db973fa55603959f9957e1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e