Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
aipkkddccajhejhkiefholbpknhmoaep.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aipkkddccajhejhkiefholbpknhmoaep.html
Resource
win10v2004-20240611-en
General
-
Target
aipkkddccajhejhkiefholbpknhmoaep.html
-
Size
897KB
-
MD5
8e3db609d882c4b5b9aaaa7b51e34e45
-
SHA1
3f54e8f34ec3306e33af45e0545029aa4e21fbab
-
SHA256
f5b1d4948580621ee8da46fcaf44ce76cd5e90fac6f7f7da3c5f930afc02607d
-
SHA512
1cacae1e2c19da0a7ab38ccb83212e37c1f74ff3eef9e22be855086c1c48cadcda9527d97bd91c4cce02f4cc298d71ac29f372d73184092c2353d4f57fe44365
-
SSDEEP
6144:hwoDq3j6/8+Wq3j6/8+Kq3j6/8+tq3j6/8+Iq3j6/8+xq3j6/8+8/Clqo6/8+GQK:2oF/CbjThK+ExEFO0uffjuj95
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133641627321254242" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2104 1480 chrome.exe 83 PID 1480 wrote to memory of 2104 1480 chrome.exe 83 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 1420 1480 chrome.exe 85 PID 1480 wrote to memory of 3560 1480 chrome.exe 86 PID 1480 wrote to memory of 3560 1480 chrome.exe 86 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87 PID 1480 wrote to memory of 2420 1480 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\aipkkddccajhejhkiefholbpknhmoaep.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfd7aab58,0x7ffcfd7aab68,0x7ffcfd7aab782⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:22⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:82⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1640,i,17964273949679246834,18169000980684896551,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56b7cf7cd4d68045277aac9ba13c3b071
SHA1b652f508adfd9b403be00f76ca6aa1dececce53c
SHA256e939041fdaa9b65dcdd669b55882b9b648536876607d40e28ad370fcda6267b7
SHA512a110068463f698a17b8f70e80d79d2cd4a699f422be9395c81f9e2b5e936fb1fb86ab52bce56263c548a6fb2fe48d4bfa607141b104ba017dc35365b5728e687
-
Filesize
2KB
MD5c8fc1794eb0de71a15be5dd686add06e
SHA164a22256bdc1a9d087643c2e6a088470db0bcd18
SHA256bd157b0d4d956d444365ca533e5e16d645df1014d000a9d9fd288a9f27c3228e
SHA5129c51e4f6cfe1e3ea95d8efeddef544c363b5fe75faeffdc8a076b35781a4bce937f8e2b46b10cb55dd6015c5132184fb7fa5cb51794cc24aa8ffe999dcef3e26
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5f13f0c155cae88d664b0d26f99d16144
SHA165839a295d3092ce4f6be241690d2df3b4a72581
SHA25678a6e5c275824eab834d91e14fa8429110160a8cee223a005dffc319159aeb0b
SHA512ce0c9b7f659c82dc77a4d0d59c88c373c4a8ab669153906527c7ca6c7cfa2f0e0f5c18aaeaa0cd94cf52857e9544aa6435f75e095923182f9f6c91f04e5e1b71
-
Filesize
138KB
MD5c2af9226e7aa1019d70473121185518a
SHA15ef90da30c1d6f1fd2c0cd5f1dd595444a312dc8
SHA2568a2a2d5ca9523f202af912ee54c2b2824d3cd8bbc5801dc96366a240e91ccfbf
SHA512c5234dd96b81095eeab917105fcf87383a02367f02fdc1e897bfaf5244455a08c98cb6f2c5a90c985c97bfc3f2a7ecda00e1b112182a3e32d283e309f3899539