Analysis

  • max time kernel
    24s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 21:12

General

  • Target

    .html

  • Size

    5KB

  • MD5

    3f26725caa084168dfaa72712dae0779

  • SHA1

    70e3c49dec622f106c3ec638590e15bbcacaf119

  • SHA256

    abd1082d27824a7be1969f485a71e396d4fb45b7a1168093d117563c353e9927

  • SHA512

    d26917fb28822de85031e5463a057883a0ffe051cc43b4ec3eaec64a3819561d8040b920ee26e31d9c34cae44199b55ad2ca878af93f67d11ea84464cf373526

  • SSDEEP

    96:1j9jwIjYj5jDK/D5DMF+C80ZqXKHvpIkdN4rRB9PaQxJbBNq0yTMQr+Cw:1j9jhjYj9K/Vo+nZaHvFdN4rv9ieJBN5

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2740
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6799758,0x7fef6799768,0x7fef6799778
      2⤵
        PID:2832
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:2
        2⤵
          PID:2152
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:8
          2⤵
            PID:648
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:8
            2⤵
              PID:556
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:1
              2⤵
                PID:1600
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:1
                2⤵
                  PID:2096
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:2
                  2⤵
                    PID:2380
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1408 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:1
                    2⤵
                      PID:2888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3404 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:8
                      2⤵
                        PID:2012
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:8
                        2⤵
                          PID:308
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 --field-trial-handle=1296,i,14475754740844534303,2659005872797549435,131072 /prefetch:8
                          2⤵
                            PID:2032
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:888

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                            Filesize

                            68KB

                            MD5

                            29f65ba8e88c063813cc50a4ea544e93

                            SHA1

                            05a7040d5c127e68c25d81cc51271ffb8bef3568

                            SHA256

                            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                            SHA512

                            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            8707f6bb30651832b45513437f1ebe34

                            SHA1

                            f38795122ff69a5dd4dc53231bf4fd69f50cdf14

                            SHA256

                            1f0ed2c69078eaa09a9246d4787854a06f1802ff19ea892b32d33813d4021a6f

                            SHA512

                            355b33c96273d65d0e226be29af3dbaa9158be4773b38d80f34a03eb8ce31ce632a395eed4632c58e839c9b70ccbcdb2e66c70abd93fb194b6b1c767a48fc098

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            9205281205f9b527c12c5652e83b5510

                            SHA1

                            a92061007cb1f3b5d604b8b483deeecc493b793d

                            SHA256

                            213b37a15486143888279ea2c835963502988dd6cc3aa98edebded4122711d64

                            SHA512

                            e14ece6f0aa580b0f787f831b88cde2d0e3a765137ab661795595aa51557fa4430ae05e6ed70d8d64059e415a90d38ef3d439b78502319acdafd7c634ef21b8b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            96e4d22d5fc17242aebaa8ca8978adc9

                            SHA1

                            53ddcd627d52f3f260dd8ed7c6411bfe84348e12

                            SHA256

                            a7b922ce0401b3ef94d448faee2e4213df72d51938c86ebe50ee6a4d454425e6

                            SHA512

                            58d4314717d752ba8eb7159af9ebdedd44de5895586f652541224136e675d92836db76bae07fd0f36f79b96730557754218412e20573290ea43cee353a0fea43

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            31a6100dbf4c8a1bdacbb3ac0989ce99

                            SHA1

                            6cf547ceba5614d3f45b2ec66323e82c0dc59aaf

                            SHA256

                            986e0e2ca3cf1806beea50f87b98026e9d06259377ebe0c5f0beb2005d441df3

                            SHA512

                            665de45e4d52a11c822668da5018ea4e0c8e57d1afd02d929ae77a15766962972cf02e8d28efdabd2857bba920992bc21a15eb3fb718350a48fef880c019cc43

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            27cc1981f4e8f58267fcfa075b35bed6

                            SHA1

                            c59d407073381b862114ba8f8efd75ab07b8278a

                            SHA256

                            c6625a06c9b9b8e91a6a4a84c5144e17498ac128ed4d04848fbe067351e3c553

                            SHA512

                            30309e4c7ee687b72d761e09676d25814f6e376e970551238bb3de61d4cac4e062ffbbb2724e1b3be0140a2248efb1d9d036d91ef1366e37759758db7b03cf9b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            b39038e285e84f8bd5d8896fcf9b7e5d

                            SHA1

                            c7f8a1ba130c5a7aeead9a07ade52e803ff1316d

                            SHA256

                            32cfbae8c38bf85154f6fbdde704a565acd5c8b896c60d6c02dd826cb72b3dd0

                            SHA512

                            aedb86a8a1f5c6bd0ec5b027bd51f12530a2dbcb77122a0a76d11b81828198643d011f756e84c8ad6b12b9dc3dddfe6a687b9ed7ac96d9605115cbf2db489fe1

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            12e91c73844e8c997e9ce47d6639b717

                            SHA1

                            70bacdab04a033fdee8ec40250042b4cb29b4030

                            SHA256

                            c751e7906c58662bd95c9fb15751592a510b74651ec70ca447a3eacf18752bcd

                            SHA512

                            adf373cdde78a2fce5b64c7811ee326f206d84231d6a6fe98b49b6cded46878b82f216eb090d0ccefd40d9fb85a03887d4e3e110d50653b0553b267a0b504824

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            347c91d822b9decb229c6f5946a49724

                            SHA1

                            e05f5c19a4ff815e9066236742c642e8b3964a9a

                            SHA256

                            5088da8e3fd3f9b7093d0f723b2920bae5de99ce8544448373be56fd9e333a92

                            SHA512

                            293a069e51fa41f38db6831a3382b1270bd990e5f2d3d6062d4cb15f83aab6f8663f88a4f520f162c6dfee3ba4c795c9e3754d09a2e834e6eafb1ce6c6a34688

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            6f812a0b6cdbe90402da1eb47fd35989

                            SHA1

                            f837c84bbcd1eaee768bc17ae074dbfc4cee16a1

                            SHA256

                            6bccf3a196fbcc32e2e14fd2dde115298e02e921625e21bf295856bac0bf6cc3

                            SHA512

                            dfc60edd05530b0a8b9f65303c654e0128a96d1fcd35b12688d0f8830489af79813a75c00d5078ab0e6aa3a88fa6838fb3dc1ca7c93136efb68af0c7d94f6fdd

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                            Filesize

                            16B

                            MD5

                            aefd77f47fb84fae5ea194496b44c67a

                            SHA1

                            dcfbb6a5b8d05662c4858664f81693bb7f803b82

                            SHA256

                            4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                            SHA512

                            b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Temp\Cab28A7.tmp

                            Filesize

                            65KB

                            MD5

                            ac05d27423a85adc1622c714f2cb6184

                            SHA1

                            b0fe2b1abddb97837ea0195be70ab2ff14d43198

                            SHA256

                            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                            SHA512

                            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                          • C:\Users\Admin\AppData\Local\Temp\Tar297B.tmp

                            Filesize

                            177KB

                            MD5

                            435a9ac180383f9fa094131b173a2f7b

                            SHA1

                            76944ea657a9db94f9a4bef38f88c46ed4166983

                            SHA256

                            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                            SHA512

                            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                          • C:\Users\Admin\AppData\Local\Temp\~DFA3455FB815C68972.TMP

                            Filesize

                            16KB

                            MD5

                            607f1d8b6dd07a5cb56f25f57d59a972

                            SHA1

                            c2adf64ccdecfef58e6ad55dfe1db9ab690f3ab6

                            SHA256

                            97b41212a065796192cd427c6db632fde3a6e992a705dab12647518d31c1734d

                            SHA512

                            03c94b3b50205f3a8d3baa3650a178e8b40720301c8bea549a673582b46774d2bb8eb56630e7d893a5ccd6443dde1634ab332a48a3273dc32337342c9fe628de