Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 10:56

General

  • Target

    .html

  • Size

    19KB

  • MD5

    046a0f4589e795692a06499a03448808

  • SHA1

    18e1c7791a66a462113f60fe5e0f47894252d180

  • SHA256

    e155851a7f80e2509610c22dc3721d44f04b3452ffac2675d85db7e66ce9e7b4

  • SHA512

    21d815be1ba6ad4b1c437d8ad34212856483c71d5f35cf4d03522018ac71d14e8fb5729f7786a04782388408220147f5b018e1176e2f49198e1b542c53bdc6a1

  • SSDEEP

    384:r0zGbDpmReVoOs4ji9ylKeGMjU8Hhhb3LKE7Io2paWhOwob0O+aIJCgMmV6:roCBVoOs4jmyI1MbBhbOSxWhOwob0/JO

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3016
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e49758,0x7fef6e49768,0x7fef6e49778
      2⤵
        PID:1660
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:2
        2⤵
          PID:2876
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:8
          2⤵
            PID:2868
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:8
            2⤵
              PID:2148
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1492 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:1
              2⤵
                PID:2304
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2116 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:1
                2⤵
                  PID:832
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1300 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:2
                  2⤵
                    PID:1740
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2652 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:1
                    2⤵
                      PID:2496
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:8
                      2⤵
                        PID:2832
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:8
                        2⤵
                          PID:2824
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:8
                          2⤵
                            PID:3000
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3068
                          • C:\Windows\system32\calc.exe
                            "C:\Windows\system32\calc.exe"
                            1⤵
                              PID:676

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              31ad8bb82b29d9d2f192161a338062ba

                              SHA1

                              37985600dfc2f28d1b0199e6b811d922d0f3f0f9

                              SHA256

                              fa97f2c38dac2a2b5e0a81b1140250ccf29d6e1ea267efd799b376843ec56554

                              SHA512

                              2cb8ce89e74d67c6c724addcc7a630741e2916b3558dbaa3419331236b002ab6372ab625da28323f54148425475d185b2eb78c7948d68c9b0678f2370b1b216a

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              c6498a80bb959e68e84c2e5fc0203596

                              SHA1

                              854827b3a430dbadbe22a71667e123fafdc05f61

                              SHA256

                              fb297e0590cc07695ad65e61d8aac56dd8b28d6f5e1cfb742d0eb9557a8758c2

                              SHA512

                              04b821febdb751b8dfbaa6aec5d809523f2a219f5b38c5e1ae2917fef3ffc53a8336476938d1dd60e66c96bb0ef6239de7cbb4d3fe290612f4fead65580c625b

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              4e41330d0edcddf2099f98db5219742c

                              SHA1

                              dfce6fce55c0c13c1f13c29041d97a8aece6599f

                              SHA256

                              d62aa240f91a81f56eb8316094f065d1eaff29efa49a7047c9cb65f5abc23249

                              SHA512

                              b18698db1925029d6af1fcf3847c493ac7d18568de6a9526bc0e3463788aadbc995e64099552fd21141c4729cdf1290e1587af24a05f477deaa9639098aa7c77

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              ce09fb65f126884743c71ed2ac556264

                              SHA1

                              4513f3b5129a29d4f030fc00f665468918246eac

                              SHA256

                              12fd9edf30b61f957a72e1098351f2d5fd462dcc2877c7a769b01d7387ea49eb

                              SHA512

                              edddc5c97599785f2dc444c288bb88c079ad9dcb03a8edd67baa73d05f50cbcfe82259f989339d4371b838752ffdbfd2d1373fd0e48e36fb2bdbe0fe51dcf5e4

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              d35ea76d36c60ea40f3a8d1c12c740d1

                              SHA1

                              8425224dadf02a71358c89fe7642be04cdc43622

                              SHA256

                              0fc3af766ad91cc649c8e7912988f9e9b23a4baf3ae6487b5509bdd663e4f2c1

                              SHA512

                              bdd9ea74c642729f2873b1b6e2875b53aea04841def9fa672aeb9ef30ac31e70ed82618a5e13462679936628974aed4b53b81c609ec9b02a90cf656c80fc1238

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              24af61cd38cefa1d11df493fee193552

                              SHA1

                              ca6f46f19a37223daa06335127914e0b2db0c4fb

                              SHA256

                              0bac2a008a93eac28284cfbe26fc351515216780dcd3c9527bcd2bb256587584

                              SHA512

                              2b3cf1a8fe722a5e2f33478c5baf692f3126a62b4e4a2d7a89f297753390591f27980a6e7983d19893294d2bd22795f077816944475d621ee73e32ae02289404

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              0e476a09a7de458c85d350fbbafae451

                              SHA1

                              cce724155f888dff9790498293aff1362e80bcd0

                              SHA256

                              82eda103ae75d851b3760987d4a966e61d33d33c6f28ad2ca113d549370d9acd

                              SHA512

                              341a7cc82cb7fd1e19b356a1be0e5d24d602b6925364a23a6b17bc40e9ef3237c9d42baa43e1a4cee582290de739396711d01c2d95ffef6f5e210862544658db

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              54f2d8986f3bbe7b99a6e171aca5af93

                              SHA1

                              a5c4f01d5a1b4f08efe9c4e6841269eeb742e267

                              SHA256

                              d47c02e6ba22eaf49b4f5f6a3f9600ed460f7dde5761378fdb9e7843cf216a97

                              SHA512

                              a0f1a53f304d1f9466adbe1be3bcf7c22104948c3a5cc9d28624c4330c9da1e30d846947500860b43b25066bcb6104f9a596e9a8d3cc59e3815e0d283d50a72e

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              8411745647531566c2eccf82a1aad2c1

                              SHA1

                              2132e1bf1b5f7dfc8b696b737512ca90ef8a6b2a

                              SHA256

                              4143098ef77aa8e6a9f0c42073ea2012873cce120c1722f9d7bd8af06edcbd8c

                              SHA512

                              d032e00fd75853783e41d8c0f1e4509f9809229969427bc81010151d2a867dffd0d1b66ea071a8f71bffc54a00d6c7c0183d75de00b161a94f9b5e411e0afa1a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                              Filesize

                              16B

                              MD5

                              aefd77f47fb84fae5ea194496b44c67a

                              SHA1

                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                              SHA256

                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                              SHA512

                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                              Filesize

                              16B

                              MD5

                              18e723571b00fb1694a3bad6c78e4054

                              SHA1

                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                              SHA256

                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                              SHA512

                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\f724cf5e-d529-4025-88cb-e353d7db2ae2.tmp

                              Filesize

                              282KB

                              MD5

                              a1686b1937d807f2695b351bb33216e2

                              SHA1

                              88edaef8b92d413bc3c9d86950a2fb1ff4d20e56

                              SHA256

                              aab1838d4245f1d4a2fcb40925fef4ec0f0e9bbbbbeee612310adebcad3060c2

                              SHA512

                              ffc49ec371cd6530f274379096bc3a321585a40c677527ff23019048fbc76f5a9eb5ac9ba2c983960ce7e8e98ab4fa22ce2f8d2523144dd6e1aecdcdd509b0ab

                            • C:\Users\Admin\AppData\Local\Temp\Cab2742.tmp

                              Filesize

                              68KB

                              MD5

                              29f65ba8e88c063813cc50a4ea544e93

                              SHA1

                              05a7040d5c127e68c25d81cc51271ffb8bef3568

                              SHA256

                              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                              SHA512

                              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                            • C:\Users\Admin\AppData\Local\Temp\Tar2794.tmp

                              Filesize

                              177KB

                              MD5

                              435a9ac180383f9fa094131b173a2f7b

                              SHA1

                              76944ea657a9db94f9a4bef38f88c46ed4166983

                              SHA256

                              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                              SHA512

                              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                            • C:\Users\Admin\AppData\Local\Temp\~DFB49981133DEA0D23.TMP

                              Filesize

                              16KB

                              MD5

                              3b95dce44f2fd1cc2cb43740607a6cdf

                              SHA1

                              0512d00cb8faf44ed68a915946dcedc44a85c9b8

                              SHA256

                              871e1b913d3149e951aab90c627928cf84e0784f232d92c312b9c19335b8c4ef

                              SHA512

                              803a92c59c8629316bfe5a2d2e0df6ff24016de4ee597bd6b7669c11f3a5047cf79cb1adb93c65f0fcacc2baed059fa3019b761dc99539f0e367c691e01d0ff6