Analysis
-
max time kernel
601s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
9aHJN.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9aHJN.html
Resource
win10v2004-20240226-en
General
-
Target
9aHJN.html
-
Size
15KB
-
MD5
c1a43cd402ad087e8ed2d6a7ec020a1a
-
SHA1
a8e7bc64044db71db48fe2d2f777c2a8ff5b3d51
-
SHA256
6f92194396b99b46a9212ffa85717148acb63e55ee31f11982459bcaf38bd099
-
SHA512
6243a593f6e3cd37ac5db4717dffd05c24ff943fc7898c8d8efbd9fe288364ae982767cccf7a16e7c87d873c68add8ca23502a1d6b47170d756562968e35ddb1
-
SSDEEP
384:yShi9boJkNzDhRG6NX16jSpTWSafF1Z6N:QoJkFDL16jSpTVatn6N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620289272559932" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 792 chrome.exe 792 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 792 chrome.exe 792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 2260 792 chrome.exe 90 PID 792 wrote to memory of 2260 792 chrome.exe 90 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4900 792 chrome.exe 92 PID 792 wrote to memory of 4944 792 chrome.exe 93 PID 792 wrote to memory of 4944 792 chrome.exe 93 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94 PID 792 wrote to memory of 208 792 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\9aHJN.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fffd77c9758,0x7fffd77c9768,0x7fffd77c97782⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1284 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:22⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2492 --field-trial-handle=1852,i,2684630777320285139,12022982917202983977,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3324 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5fca3a1c2a511ff57381f05d518f1987f
SHA171e5cafb58a4a001b1be39f547c0981344dd33b4
SHA256e15c0bd5c8b1117da4269b9f1f50d9ea142f7f60bc537c5564f74d7150e4fe49
SHA512976d0de402c3a90511f1bd042eec5c26a6daa8e6312db5be2868981141644dec90c28772b4805200d58be70197a790ef19ed9df8451f0b902f6b64b2aac0feb2
-
Filesize
5KB
MD5cd0625bb294cb45f9062f7786ce8a25c
SHA1215f54024e3c536c65e7d249f4624665dc12b9b9
SHA2561a27c1fecc0c732b63e398f9e36f3d2c10ab029d31ce40c4c076479905df42db
SHA512c98b0efa92ed2b0107d19da3e2886a9a29142f77c018e348e2edba9d326b3b2db4c393312f3f5551b98ab55f7fcc5e10eb540dc2394e7aa949f0342a49ae8d7c
-
Filesize
5KB
MD5330a22e240f30b28526a89c44d82dd1d
SHA1f8c38ee96fbfb843b9b121ffc956623ccef1fe36
SHA256e8e1e2b616e37f0461fac4afa041a308e884423bb06e58232149acd59d096acb
SHA51242a63c08e19e9db338c45c4eb1759ea204a21e3e704aae7dc3560a6f8318039ed68ed49ecf0662593db521a513c283430031a4698a9e2ec6673cb662bd5fc21d
-
Filesize
128KB
MD5fa41c93df076283c3348a9afabed9548
SHA1578942e6893301dd5316751b7191ec1a45064acb
SHA25620285f3074b225d731721399d18a68fdb4b44616bda9320744898758ed7eb95c
SHA5124fa826b8bf0c00ec5d3f51e5aaa7e6c8cfb1eeed932a1cfd94390d93c48fa06712cecd904b6a47bd682b86e463c4dbd42de131d4f3a5414150b87d618ef0f683
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd