Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win10v2004-20240508-en
General
-
Target
email-html-1.html
-
Size
5KB
-
MD5
271e0dc99061a7a5cd2f038000f2fb8a
-
SHA1
96de5ed88b10ed351246f51c58024871d743d213
-
SHA256
4decce7193ec806ae755f9634437ac9e98d7bf4f024468bffd91b41f820c73e1
-
SHA512
f0e278fd27375fbac873338a03d3a61615efd7c8c139f78d616fad3550a3f2171c65e387e1fd461e267e667172ff541fc43b11d663038e41cb5bca4e0fc060b6
-
SSDEEP
96:80hz+TDmHGfKn/hJKDeBzgqBXgLN7CQTaZXet1E5e3NOb19rFbRabj8STPf:JBnJJQcXOcGs9BQbxT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133614750152859156" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe Token: SeShutdownPrivilege 3408 chrome.exe Token: SeCreatePagefilePrivilege 3408 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 5024 3408 chrome.exe 83 PID 3408 wrote to memory of 5024 3408 chrome.exe 83 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 5012 3408 chrome.exe 85 PID 3408 wrote to memory of 1196 3408 chrome.exe 86 PID 3408 wrote to memory of 1196 3408 chrome.exe 86 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87 PID 3408 wrote to memory of 4868 3408 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa127cab58,0x7ffa127cab68,0x7ffa127cab782⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:22⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4524 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4512 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4648 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3188 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1896,i,13917863532048464397,1229070245959779857,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ccabf7dfea1147b0ea8b8643eee21c0
SHA113d270c177a5ef6007cb88add52fc6986d0d824c
SHA2561dd9d2caccd4a8c30a618524790b434216036afcc85fac7313d4b0340e122caa
SHA51271a6424e012f2c319142116efa6202c64f645596794442f93b3b6fc04e6f127d9940c6326b09b96578bd50909dcd654ce38889d77c8c7d98b49193614758d2bc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD58aa06eaf401aa0c056615d4a9db9dcf3
SHA16609b895e8b39602be33a73ecd2e2d4c667aa2bb
SHA256a56805ad93fc7da3736470e4463fcbfc20f695798b40fc6691bb5599313523a1
SHA512e1db3e61c693dbe0d3792b3c3e61401ebf31bd1a431937746466b5ee3a1994851ff6b0d0c11a2aa56dc1871ce0aa648545c537202b4a9f8176457e93ac45280c
-
Filesize
255KB
MD54bbb9bffaabdff0c5f5f63a766524153
SHA1ddb017e211362cc5af60e6fd49fa2ca971b457dc
SHA2568e574c2a98e54f4192b218704cb9b208cc208fb48eb59ddce82e366c84a44a14
SHA51293640e3f495f7e0f36ab07257f436dccd289947915b5761d8c0530f1313be3b0f2fd246513010e4de36173f0580468e0c94f47e58147a9f5382f35d3a44284b4
-
Filesize
255KB
MD55baa6bfb4a954563f4d8c3cf86004076
SHA11ba514785870c4a263fea72849d1a36882eb0172
SHA256aac697d511b88331ef0780fe3e2f4c54ec4f46441c7c9a5bf73859b7c46987ce
SHA512f133b4f12c00dcb189fcb697d8df8a47e32ff0276b0b7c3d14a2bb1ad16964a424a90c134e1188507f30223a503d45b42e1cbc5e4eb14486267c7563d2ff7139