Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
5PDIdG.html
Resource
win10v2004-20240611-en
General
-
Target
5PDIdG.html
-
Size
500B
-
MD5
39b1bcd93d7c8ebd1d2fd1ba0a34c52d
-
SHA1
54e81725a0611ea272a0e97508cd3cc3baf618cf
-
SHA256
93d92a355bd61127340deddf028c312f2a35548a7448e5655deb77bf4196c17b
-
SHA512
7e7dc45f704e3c2cc2f18f9d981725703f09ccf7483ca9b26638488caf05e9a63152bb84e3b194865835644c74770397b551b6014e67d4e0531b0a5ef066a924
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133641042640838985" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 924 chrome.exe 924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 924 chrome.exe 924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe Token: SeShutdownPrivilege 924 chrome.exe Token: SeCreatePagefilePrivilege 924 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe 924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 924 wrote to memory of 836 924 chrome.exe 82 PID 924 wrote to memory of 836 924 chrome.exe 82 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4620 924 chrome.exe 83 PID 924 wrote to memory of 4032 924 chrome.exe 84 PID 924 wrote to memory of 4032 924 chrome.exe 84 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85 PID 924 wrote to memory of 2928 924 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\5PDIdG.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1b64ab58,0x7ffb1b64ab68,0x7ffb1b64ab782⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:22⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1848,i,2466484575265419363,6255539964222323474,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a738694b5d68fe290d98db0a476a5ca2
SHA1f2f1a94bd328f51c6ec17a62436c906ebe36ac85
SHA256dfd6a2c269f836405f35b42e25941447e8945f48ade2a4ec89e6b5e883fe0ef3
SHA5122679b1af3773c87db4e040bd8b1c24ecfc556f8df0c651496de4d3d14b50857dc76c78765315c994efce15271ac30cb735979b7f26a6a6096d255aaa25381d6f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5a0083f8b1984780176e116b59a678d0c
SHA1899dd56955d80a20d792842be959ad490ccaa290
SHA25673b4c83f8e3551b4dd020b19d690382e7fbeb06f652f162668789fd8e17b01e1
SHA512ce89eaec55a5cfcfbab2d04b84d4f2fbece0315d09e85f18ae52c4ffbeaf88fd238ca79e651331e84f0493b479372ce011f15ebcdfae5dfabdeec6fd230054ef
-
Filesize
138KB
MD59a6b0a1c7a25f0a0f2e70f9be8bee21f
SHA1fa6d0ded383fe7dc5813c1868acfd6a6532f333e
SHA256c96f750e3c1714b27865809c409feb50cf57fee3f57350a047ac8ba66053c388
SHA5129970b7f6d3c3c07c87149f9c15d1f51db81ba91f47f0e6a46426e0601d2399dac838c91edd4fc1653ac2379f60b974256aa8024a47728e91a5b34f461d35694e
-
Filesize
138KB
MD50fc587a6bf1be5e099247a6cc480cce1
SHA1b1cf9f25546ad37095ea4862cdc7af736e8b4da1
SHA256560ff136cc122947c00f28e09910471966cd0a4fb57f3d9f704eb678cab6286d
SHA512df95aeead1d6217e2d8df25ee64e6f464170a757b78039eb1482fae613adfde35fc1706370221bc6c3a58aec7044bee0dd711fd29401330193b14a236f784d49
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58