Analysis
-
max time kernel
88s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
Dentons Financial Report.html
Resource
win10v2004-20240704-en
General
-
Target
Dentons Financial Report.html
-
Size
8KB
-
MD5
0eef7eefe89df367df7a37fff3685468
-
SHA1
d350358440ce0c499f4907cbdec186f977a9a452
-
SHA256
0824cb8bbacd1e54b90bb4e1631bcb4370f12dbed4f3baf01e194bf6bed8842b
-
SHA512
db97726452ca846e052a6d80f069a31c249ae3c8669cf8e9c2ee5e125cf2c543743ad1c2141206c6887570639acd3400fab1498f4d210a699a791402f50e67d2
-
SSDEEP
192:8BwPhuBC6QRkEibZAHHk8GwD94R196NwUaAMen3BvdgLtHm:swPhu064Sbkg19GPMeYM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133650117963996214" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 1992 3924 chrome.exe 89 PID 3924 wrote to memory of 1992 3924 chrome.exe 89 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 3524 3924 chrome.exe 91 PID 3924 wrote to memory of 4528 3924 chrome.exe 92 PID 3924 wrote to memory of 4528 3924 chrome.exe 92 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93 PID 3924 wrote to memory of 3856 3924 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Dentons Financial Report.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb261eab58,0x7ffb261eab68,0x7ffb261eab782⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:22⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1872,i,12978437087647328048,11843971326020166503,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,270339169963605285,17552719617811964021,262144 --variations-seed-version --mojo-platform-channel-handle=4640 /prefetch:81⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5367757460c77860ff0c831dacd979dbb
SHA141ee179900d66c2433ed46bef1c86ca71299081c
SHA256bdea8e64392f2ea32bc7051eaf7546e5e7135203e458cae81d3c39f72078be2f
SHA5120e457e78d3a18f49f55743f2f4d89bea7519c5df7ea43e684c928f1e31c94d4e34102de9e37175b111faa2a493e8707139389fd97051021a0309787669a32cff
-
Filesize
1KB
MD5a8e916466b499809451d9ec9be99f5a2
SHA1167e776d4a53e39f103bc3503a316d9451acee40
SHA2563eb23a06852b06687f293f0ad516b9ffb6bbbbf2f95f2fdaa788e4576c871341
SHA512929217831ed9c302977d7ba7d10c1c72e3eb9fe5af5b7a451880d3a83b21da2bb034ae6d95fdcd00391fffe971299e4ec5af216f2958c698e4152cd51aee27b0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
855B
MD5db9360146d36707faa766d0a78fcb857
SHA1531a47db72120ae38559a46cb08f9232e7f81d61
SHA2569a57a3411d2709607c54b99fb82b6fa6128eea892e724e02efc11774c1c2c8f0
SHA5125538a87bab2f4d0aaa5a6d8c3d40572c23580586e481954498db0fe07c9f4992db12f632d1c855fe6e88e57dd0f4f081124a0a4f55e78ea6688535b0feeb862e
-
Filesize
6KB
MD57f78492d528ebbd1560b34a696f2e5c7
SHA108c15e574f8714eec6922b80390139c5f6f548be
SHA25605cd2e340e0c98134c2e9042cff264bebbd650678f0dfa50c7927372b2b30d48
SHA5127b8f045d7a66d0351b9bd489ae9d4d366ef86c226647857eac4506d90dbdd8a3c63b28e9905357dc11ff124cfd4c17f12a3f3b687b98fd24cf54d8fd86c8274c
-
Filesize
144KB
MD543a71e67c1c6f24ad03b17244b156340
SHA1048e0e605f8275d5162afe572a1d567e67fae947
SHA256d40d6655c1aebb12a08a1f8ac2ac6d857d41cb57c75fdb78c86b864090ad6ccf
SHA512af00a62dd1e7cd12dfde13fd1294b05666b7b687a95c6dc674d9333b97416251a84b23a3e38a9d6062deb22263ddb3a66de0e58ba9bdbb24aa02bd4a5f059529