Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
GTA_SAN_ANDREAS.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GTA_SAN_ANDREAS.html
Resource
win10v2004-20240226-en
General
-
Target
GTA_SAN_ANDREAS.html
-
Size
22KB
-
MD5
b67606448b9c1943b42add86a66ec85b
-
SHA1
6d88d5d65cf33198ba3d67d7a309900107933815
-
SHA256
ce6ea187f348854060f25b2ea42442515d03ca9f7433f935a4bf97529654fa0b
-
SHA512
6c89a6b329308bec15dc00add51dea533156d4bb3c6727ff803da41415683935e1f21821fb864a503213b469ce4dae557377c23cc8df4abe966b63c6a27b5e2c
-
SSDEEP
384:awn7+zoZoafiCngCN4KQ6aoSxmsb1JcL6pXxEbgEaKZaEcXrdKD50NICQSQMSJ8a:JnCzcjfiCngC6Rm5R0vW1Yt6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576999998873935" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 3608 chrome.exe 3608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3460 1616 chrome.exe 91 PID 1616 wrote to memory of 3460 1616 chrome.exe 91 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 1504 1616 chrome.exe 93 PID 1616 wrote to memory of 2260 1616 chrome.exe 94 PID 1616 wrote to memory of 2260 1616 chrome.exe 94 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95 PID 1616 wrote to memory of 3712 1616 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\GTA_SAN_ANDREAS.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd50909758,0x7ffd50909768,0x7ffd509097782⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:22⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:12⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1004 --field-trial-handle=1876,i,15254670012976397852,5565039866137037655,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD51afc3dac53f3c9a52c00ba639ad90b03
SHA12ff8ed5791498003a5da7f9074b337a6a6d25bb3
SHA256978eea90027d5183be3093b7fbc7870811a5918fd297d8fff4213e3995e143ac
SHA512eb95a027ff01a9a4c2ca8e272ef0393b027928132fc1918c04753b94a3d671348aee7234e8ddb9008c82b21f8769ffbbc27684c7bf9452ed9cd5659e8c9495e2
-
Filesize
1KB
MD547a728f417e38317ccc7b0f5122851fa
SHA1bcd994bfe3fac50c25f4fbb10fac80ad062fd41c
SHA256006cf881e1e828a445ed74b835174460da0914d1b4dbfd1dd164d85cc75f91c7
SHA5127f4569fe34dd274f31608f5f7c7876ced4bfd6bc95a1c97f3cfe961d51e6035d6e3e3d628a6618c4d1d10c9e3c67135fe9d45770e9af36105d44726a960d5d21
-
Filesize
5KB
MD55848847ff48bc26d3cfece787fbfbac7
SHA1f19e52f10144c5961d6f3186d4235b9a0b19e31c
SHA25623730e17592cbf6b8ecfedb316ef292ce35d94ff0964049c0b284579a6024d65
SHA5120895a5dd84876f236e43bd9eff9f4e315311c87fc11f8a371dbb8e038168362ff2823d82324178f7febaa875edff5866fa0248eb27d6fbbdbe7abd47358bc434
-
Filesize
5KB
MD591f22382db2b6194f06201d38272b1d8
SHA1e1aafca0ed71d9c1081e412c70a8349c9a356a68
SHA256177ce1c928f5e4e04ab3e4afda841485a1a37378ae29b351bed2d2b3959e60cf
SHA51238decf1342bbf14011e57410ca02870d50d4d2ecfb4cccfa76bb47b5f9d824456257ca9ff6ea92e0d98d5c4f3fbc2a0e6c275c6a73e527192de3a6887015764b
-
Filesize
5KB
MD5c470201f59e9baafb1f1771a6a6cb26f
SHA1bc5e14c4f3ce8d6665a7afaf31aa7236bbc82112
SHA256fac734316d7564e70462b102d0480babb1ca57d2c6fe87fdfbda98f5beca9915
SHA512f22c6d62e41b896d600732e1c5d39282929f34fadbd87e421c9c83951d59831ae9baf60bf13b1bb933f43bc549c4db0d5b9dce6cf6dac49286067cdbb9e92e32
-
Filesize
128KB
MD54d50e7b0faecb4c9ea1d3323eb0774c8
SHA19e3188391d2e79f8c7a653f6348fede1363d182b
SHA256d636078253655397c45d73f1b406562756aab3c9e1779fded33b243e9c59f914
SHA512d1df526f83caa6c506f42940151298ce339dd79079699f5efde53b9aa4f4948db69f3b793ff798b56a3bb69a2db811d2919c7727a62d5a1f8fce1cd602047d1c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd