Analysis
-
max time kernel
7s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
Rc0TgAbY.html
Resource
win10v2004-20240426-en
General
-
Target
Rc0TgAbY.html
-
Size
2KB
-
MD5
8aa255043c8ec968e98e746384e5c958
-
SHA1
23c48e73d03ff28558ee1e5ecde848cf04126418
-
SHA256
eeade6f9820cf2b8786978dd8bcd036a053fd150868b73c17376312f49d7ca7a
-
SHA512
a377d2523a53c61af084afe4d197b6945460da7edde77a7c031371c2b4fed1381021a2cb4202f8264f3c12c3ab2ff79812f7afdca8ca2b2b0fbb3e5c3c0ab765
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133610093759852229" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe Token: SeShutdownPrivilege 3664 chrome.exe Token: SeCreatePagefilePrivilege 3664 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2540 3664 chrome.exe 82 PID 3664 wrote to memory of 2540 3664 chrome.exe 82 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 1196 3664 chrome.exe 84 PID 3664 wrote to memory of 3688 3664 chrome.exe 85 PID 3664 wrote to memory of 3688 3664 chrome.exe 85 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86 PID 3664 wrote to memory of 4008 3664 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Rc0TgAbY.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b88ab58,0x7ffc8b88ab68,0x7ffc8b88ab782⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:22⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1868,i,5866323704574139926,7272967303144944031,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51f39331b5ed1564e419292ef25c10203
SHA1be2e0b51c9d6f7525ae2e2edf018feae3cacdf5a
SHA25676bf2bf4c078f3062214e97f2c45c5bfe97fc1a5f15d11af63aa602e832bccb7
SHA512c1d4784fce38c0b87fd1f3be10b077a8c9855937edbeebd3b67e432d9c4ab3dbb99be89a2659c535e4b356e5fe3803dd6f64838c7ce7924fa30c954eb8de79ca
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD55d9f8b1399b73915b92e60256f2a9460
SHA1335c0b9b707561e4db87309b6ff74d97462b4dce
SHA2563bf44f10cd03c5b96a7365b36abea5df793134831c3fd08b51eebeda0b9e835b
SHA5126ba7418e3fa7addea96aef2e2d9319d9e54057173ecafc8b282b67fb00744338c5d46271808ac3a6cf81bc13007e3794d6fa466ab91afb906bb18b6c732510f6
-
Filesize
130KB
MD53c5a565172906c32c2a8a533dd893683
SHA12b82de107e6c7d74fd517f2520182326b8fb4ecc
SHA25615ef867366d8fd3bad14dba60562e736272c3019bcd784cec424bdb3492de425
SHA51224bbda7b9a5a489cc08c33579838c45f0ba15922c17ba27aad9566b9434dc7ea4a179b700f82fd36532c0275cf7bc452a480a0dddcc088f27c0680f977815ed7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58