Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
search.html
Resource
win10v2004-20240226-en
General
-
Target
search.html
-
Size
106KB
-
MD5
02b247a9d34fbadb48e4c29498b96949
-
SHA1
40605d44d5b4f3771f972d2d2ceb98e2dd746d35
-
SHA256
317ceb47132a6e716dfdb690f19f0796656d38d24190022722506d59542a88fc
-
SHA512
d82c6ea02b40f026da63a592749962528d4174ad8f8f944b3cfcf0d75de9a07655e42921086a3582ab698f12f5150863d55efe04c9c386fc9c8a8dbde2f87475
-
SSDEEP
1536:mor+bGATo16Kp4aes82mzWrH+WgSVduTdp0dXXHy+C0nKW6L:uToPp4aesUWj+WgSVdcdpAXQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558862150972659" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1756 1620 chrome.exe 89 PID 1620 wrote to memory of 1756 1620 chrome.exe 89 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3744 1620 chrome.exe 91 PID 1620 wrote to memory of 3716 1620 chrome.exe 92 PID 1620 wrote to memory of 3716 1620 chrome.exe 92 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93 PID 1620 wrote to memory of 4992 1620 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\search.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7bd59758,0x7ffd7bd59768,0x7ffd7bd597782⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:22⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4492 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=820 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 --field-trial-handle=1876,i,2820447626311694464,11054292841910239643,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53d32c24a0f2af51ebef1b777c30e2db3
SHA11c4e6b2b501c7aa095464220be61a29f959135f3
SHA256a7b673dda1dac6261064310f4539d5b617957cf2d18d37cafd506ab75dbdd288
SHA512c46685a33e27814f3562459ad643456da62d55223453334c82f8011407f74e21bb5a47c6fb66f00197534bc18db6ae95405c0120b7837da4c33138101c7237c1
-
Filesize
6KB
MD5a8e2a5d3b157f6b4ba96014f4bf45936
SHA159401cf4a90d37b364da8f2d1c219cca7d375d0e
SHA2565e4564d2d0db330f24b366a24b4d173ffa07911c4775c8ba1fa5608f860fb920
SHA5123c270e61552c132b102f9ab82a4665966c83bd08cdb0948eceb93d8ca41742afec17327885afdfc3d82370b445945839e700f416469cf2a96efbff9549d5be35
-
Filesize
6KB
MD517b6e097d65fc2c1029aba8eae270097
SHA18a17e39fb4b6250715a9dd6b954afd321219d951
SHA256f7d4101f565a469e0ef833e0f104d1592b3fffed6e604789794db81ae6876c32
SHA512f9554678b11b552f35806489c50972f7ac7a5768ae22bf88731c0e5ab2067bcc5ef84b69f04f70ee66abe3ee8b46872bd0722b5367a5a80bf7e2137a46f39d55
-
Filesize
128KB
MD51304a0347e3e0e68b7eb74f37c91c705
SHA1898b5907790447a352ece1ecb53c5fd95ecccb76
SHA256c639f415a8190c26cc0fe73287e52afacb8fdc7929d0adf8e76a4f96179c0997
SHA512094112fa0ce98935fc58e148329212503dfd1ed3522c8a7ff45793a331a2262f140c506317c53649c15d00919ca81f0b59822f3768904f55abc9e3d4e388cb15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd