Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
Dark web activity detected.eml
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Dark web activity detected.eml
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
email-html-1.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
email-html-1.html
Resource
win10v2004-20240226-en
General
-
Target
email-html-1.html
-
Size
38KB
-
MD5
11c56f8670a36ee92b9d4747323416f8
-
SHA1
f341ca4aeb66f46cc1125a822523abaef07fac29
-
SHA256
b52538fbe737ff93e3fbceddcd02d3def5d489ef52993c617125cec268a3dd39
-
SHA512
b16ea2056f7a8532b34088151d39bbb48e01dc82075088c61efd795c1c5a47450925cc4a16b884a57ac0baea0019697a1a05af8fd145597571b188b5effa5e17
-
SSDEEP
768:gcVmSbcouJREBd2Zcng7rUZsLIcshU/p68:tVd4jJ42Zc5ZsSW68
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558956403508499" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3084 wrote to memory of 1036 3084 chrome.exe 90 PID 3084 wrote to memory of 1036 3084 chrome.exe 90 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 3184 3084 chrome.exe 92 PID 3084 wrote to memory of 4392 3084 chrome.exe 93 PID 3084 wrote to memory of 4392 3084 chrome.exe 93 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94 PID 3084 wrote to memory of 756 3084 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa35629758,0x7ffa35629768,0x7ffa356297782⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:22⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:82⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2340 --field-trial-handle=1804,i,1789318088969907268,8815932895243430025,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e472b25eac2524c5d8f233cb5b70c3b8
SHA1f013d29bde4b8e75bb4390b0effc813f98130605
SHA256e00f743a61834a6cf5e281bd88558cf23593b1aed4b63bd327e3944a2ef7c4bd
SHA512f20bbe1f0db6e62b5f73fbd3eaf86997c267b4b95d385b0725ada2d01577699fc6a5734dd94ca3e3df852682a913881dac7070920f5691829180b83a39c6f81c
-
Filesize
1KB
MD5620234bb43067c41b70948462bc8c855
SHA12f077808f2f8a5a2c241459ed1b35b769796fafb
SHA256f1168c1496b5e2f7c0cb191ff1602de919b37448908afef2d5c2c1a01ec6d5af
SHA51211bbc691450a66c0781b4efcc30a13e6d3249157f3f5dde376cf7ba906b336406bdb719e349d085825323397a6cfdd95b8d0ab40221dba76484a64d0bf71922f
-
Filesize
6KB
MD5de27ddf5df2f6e9017ef1a3e3b8c6040
SHA1b7d2d8e279205b245ff95652aabc4d65caff2d70
SHA25617cdb9672a7955687797778b65cf4c55cf71a20ced2410f1baa5fad17892dcfb
SHA5126535e62375ebd62acb4c618ed191d0dd3804cb427642f52d09f02dd77335c5eb5f5d986575ae5ad47b81018e03c30d07c566b85d451b4cba7515ccec68ab0f05
-
Filesize
6KB
MD50246863bc99e4a7fae8c2462db93c143
SHA168f9f57725aacbe55434c638a96c94daadce4bc5
SHA25666534e8b836f5b9c2ec2fdde67e27e9743fc6e836cc6b2032cd7b850dd3d9881
SHA5128125bf82940b56c44cfd881fcd97b61ed3c55882d6fcbda1cfc37e777ec36ee91b2e5ed4dcd4652898571f57fea3051d87601eea9309ad4775963ca14161e17d
-
Filesize
128KB
MD50b930bf217d92a1ec45b3e3d47a9177a
SHA120e43684d2f0d8deb639be3bdc4f3c3d7419ffce
SHA2569c3c7ba88fd96aecee8f131e5302944b3d17643279ddb247dbc7f9ccd9bad031
SHA512d4ff0edac2ec3e382855acc913644f093110bc9dec5d620763259c170abd9c7b1a42e0217f50ed7c86efebf728c1c61cda08e4ec8b0b067e71fb63795fbdd103
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd