Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240412-en
General
-
Target
sample.html
-
Size
20KB
-
MD5
f0691a43b76cdd30d301bbab4eb42b49
-
SHA1
dee0966337c8eeb5eb47b40b35ee849d12334fc2
-
SHA256
6f637e63d4f88248b5ce1268f026f9a24fc059ee11bb2dfbb44a34920ae08a25
-
SHA512
9e6cd7ca9903655fd6bb98d2d859699f0ba45cdb22cf7f1c57e9256eb497369d8ef4ac8128dedde277f77abe197a71a09f433ad4df85999c7ca6bc3eef127776
-
SSDEEP
384:r2ftQRMDpmReVoOs4oi9ylKeGMCUiHhhbuQUS76vS2LjFrSnT+RVJCBXQL:r2xBVoOs4omyI1M+Bhbz96fFrSn0JQQL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583135091312020" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2108 4868 chrome.exe 84 PID 4868 wrote to memory of 2108 4868 chrome.exe 84 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3400 4868 chrome.exe 85 PID 4868 wrote to memory of 3536 4868 chrome.exe 86 PID 4868 wrote to memory of 3536 4868 chrome.exe 86 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87 PID 4868 wrote to memory of 3844 4868 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7dbdab58,0x7ffa7dbdab68,0x7ffa7dbdab782⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:22⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2376 --field-trial-handle=1844,i,1164812674732833263,17945976516937201003,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5d9375ed41ee05ddfa66db49fbc5c0842
SHA1431c7e4d0a3d7eacd07377eda00d40f2e4acb865
SHA256a1ab79866eb73a1a4e181b3fd5e3507d090d808ef5a46db9046a301c88a432c7
SHA512fb2051a011e30c24e11a51a857246bc2d5fb9e30795a5f97d0193ca0be819eb6a1394654f79bfe50aa442591f238fd7b54c14254e00b04d9bff7620146f011fd
-
Filesize
250KB
MD58b4359e240c432704ff62fb438b18f5d
SHA16e5a5afb21d5713bfeb04786e300d5baea7b7f20
SHA25642bbf21ad5102a3cf97bcb271b81d687310d5426e0361ae9b8f9bcb5c9a6c20e
SHA512a602c40ba9f4e70846febc599630df55977b215d639283b46ce38bb8423830a2f7a9f9bdfee2530628a452759bb8d213a581beadb1743876c10581d7a667d2dc