Analysis
-
max time kernel
27s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
index3.html
Resource
win10v2004-20240508-en
General
-
Target
index3.html
-
Size
2KB
-
MD5
c8d58c8091d9a111803dc9227391b0d8
-
SHA1
64ee4538f630a4343186678db233a7e0b6004921
-
SHA256
0a0b06bd1d80723cb3ee56685716eb10cfa0d0e64f9c24390090166531317461
-
SHA512
17202c6561e5f162c8fe453a25ed5e2f04940c16acce26df2cbf3ed7f223994619a52c76e7d9e840117264dc10120968bb9a13182cb9d3472dcdb2bcaebd6438
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619097424154977" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3512 2316 chrome.exe 82 PID 2316 wrote to memory of 3512 2316 chrome.exe 82 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 2752 2316 chrome.exe 83 PID 2316 wrote to memory of 3524 2316 chrome.exe 84 PID 2316 wrote to memory of 3524 2316 chrome.exe 84 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85 PID 2316 wrote to memory of 2616 2316 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\index3.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffef941ab58,0x7ffef941ab68,0x7ffef941ab782⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:22⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1920,i,10969481147687088109,2566615124858847958,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5bb4075483626e93f57134244211a675f
SHA187de7a43870eb60b2cc39ff808826190fe87faaa
SHA256b5803fbe8d7fabcc4de958730f6cc7c900afdcc9c27cf2e7e958b0535e14b7fb
SHA5123428e39bcf3c288de0b95f2c41094352e7c39d33774f61ee1d47166f3f89b1ca667354f80649f050352b53ef8da3ed6dab98720f395ea25b0968782e31cfd734
-
Filesize
129KB
MD592982f6b98b526b4fe6df3ff47bb8ded
SHA11324a42ac1886de6f50ad9c17229885fa732d826
SHA256ad68e97dcd4c3a561c01c9e9c6874e57fbd253de08cf21f74f52a8e79d59321b
SHA512e85e5d5e08e2978fd4433d3beb26d977aed715a4d3d14cfb5ef9de7985a8c2dbb97cf549d40b55b8ad3dbcca4703975e5765b6542204428ad4c6d7de5e40109c