Analysis
-
max time kernel
600s -
max time network
487s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-05-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
download-test-viruses-for-free.html
Resource
win11-20240508-en
General
-
Target
download-test-viruses-for-free.html
-
Size
161KB
-
MD5
f5f888b8298bacf6664cb9da30476cae
-
SHA1
b5af13f6cf15e1edd6f40dd0dd0d64a11680836a
-
SHA256
cb4914b7f805c520c8d7c7122b8eb66466c7cf90ac30706db6ace59427161ee0
-
SHA512
74f8f81faf4ef810ce42f962ec5f01f827220df3ea5afdfb8b71123cc86fcd37d81389f7e5630d23285091f54387e71e46c59112de84a0c1ec6f80d107455410
-
SSDEEP
3072:DS6VXvnTqNDV7oHsm2pFzAzYjZotjEZ2Tboz/OtY3dx0l3XPiMH/p9RjZR6+jLh7:D6DV7oHsm2pFz+jEZ2TbH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133614952533244660" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 968 chrome.exe 968 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 968 chrome.exe 968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 1132 968 chrome.exe 79 PID 968 wrote to memory of 1132 968 chrome.exe 79 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4688 968 chrome.exe 81 PID 968 wrote to memory of 4352 968 chrome.exe 82 PID 968 wrote to memory of 4352 968 chrome.exe 82 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83 PID 968 wrote to memory of 3680 968 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\download-test-viruses-for-free.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff95b66ab58,0x7ff95b66ab68,0x7ff95b66ab782⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:22⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2128 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:12⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1808,i,822369685536694439,12184845563864515136,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523e91c206dd20c5f8c9f7c27148f8b43
SHA11a6deed3387b11d7f2a3a7edb0a074a6c8de64f1
SHA25639687a66e0adeb019261781be75a01c187ca4ad336e5d532359c25004a04b4be
SHA5124be5f5c23f6742dc42e7b98517a63b881490d5b4211fe78e6c39da787a9282369d741ce8e2766a6161326b41d48532e3a5d49cc67c4b12bc7c6d539701334afb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5171692b35468a39e5c841046861df35b
SHA1cef945a8da0811ee178e70b28f46888970419083
SHA256dca0b5e81cd39846b305bdfde1954fd9de086503118474696a6286d02eca28ee
SHA512778f42a8347829e83449558a82e08ddad641988b3222d914ddcfc6456f829928fe8140ebab0fe371d043b60fc535256a19be5afb41af8c3b84258d6b5129ddcd
-
Filesize
6KB
MD59636b0787b95727b0726f46b6f79135f
SHA1a40c747c44a0ea3b260161e0bd4b3ba919ecbfbd
SHA25609cc7cf1f8214a8551bb6a497ca91876a5cb46e71c68be630c83a99dec5c4c16
SHA512aecb25a0938c71c85445e29ebccf7f6bda97530000950faf89025b5de77cbe48d1583ec9bd19ba720aa37560566c292fc6119f66bd524c6a27d50efda187e298
-
Filesize
129KB
MD54f1118e3fb12956d1e209a0c9bb5e3ff
SHA10140743c252626ef1a91f04989d63a0eb883340a
SHA256061e82efa88a120a148ccdfbefacee43e67341c7e3c7225f2f982cf27a31f7b3
SHA5126575034cbbfb9fb38fc22724c64ef2593abad8612aeb0c53d647e9d9530182b1fb2b339d17f48970e3e8128a40dd2d81e658cbdcd4c17dab5e406836be53aea2