Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
1181673325538324500.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1181673325538324500.html
Resource
win10v2004-20240802-en
General
-
Target
1181673325538324500.html
-
Size
4KB
-
MD5
32ef0a7d9311466664cefdff71fa06b1
-
SHA1
21b0c5f408105aeed24261e0caa9c1581d149730
-
SHA256
8bdde3408acf509595dc2ec2d56d6b10b6010f76e81c879c87dfa230c37ea2a5
-
SHA512
4f4857d6784e6d9c28bea2b402af568c2d3cd5d86680a960fcf05c64d9461f66583f3ff4a1f44265f82eb95a3f93cbd24b1b3bf1c44a39ca541ba2824e2ff333
-
SSDEEP
96:yUpHDOfRr8Le6e5hNvtdLXe5GaZfI77E2nx/IJ:ycH0Rr8klu39khnx/0
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677873501111188" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 5112 1876 chrome.exe 84 PID 1876 wrote to memory of 5112 1876 chrome.exe 84 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 3172 1876 chrome.exe 85 PID 1876 wrote to memory of 4132 1876 chrome.exe 86 PID 1876 wrote to memory of 4132 1876 chrome.exe 86 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87 PID 1876 wrote to memory of 3568 1876 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\1181673325538324500.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff85405cc40,0x7ff85405cc4c,0x7ff85405cc582⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4424,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1044,i,16772733922765529117,2295020641129168319,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51f4d67e84fc35fe8ca7f42e70a40f8da
SHA1325743db4f3eaff01f98ae3f2e955ac1197eb774
SHA256a1206557ea207453039f32db296a589c2c741c4c3935227b2d7a320be780c9ab
SHA5127bc7d5d827a676f34dc6221565a939065b0c75a6e40bd2c7b2a78a5f017963d792c422eb3f27d41295ae80940363ada00683ea90a69b722587d397ed00018e53
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD532186cda610fb30ae54909b30c5bc9d3
SHA136c29482df738546f789085cec4d66bfb43eabc4
SHA2567aa23ade9272159496a5ca0d2f7ba1869c45f793fcc0a79c1bc051714e6909e7
SHA512ce69aabd399d162440766b0f01816720ac7b91374718492f5488e058f502b5da046f1b7e083d3316eba6421af5164d1be5dc512059f152edb773a85bcf0d006b
-
Filesize
9KB
MD5f2a9efb360aab20db34fca2117056149
SHA13ab68c6c2dde7d397f6fa7143502647a070f1431
SHA256ddfbfeddffbb43069a06651571f2b47930b8f9544724444dc9852bdce18d582e
SHA512b681f6f91ba7c2b0cce23239c5b8338cd27d3752169aea12cc9d0ea4893c440b0909f5048304fd325268843a5769ee5d9a2bd4a1ad7c806d1632e1d3034cd5cb
-
Filesize
9KB
MD5ff33cfc8d50c377a71ab75ce7589f562
SHA1b7b4a8a03966aaa24dda84c767481816e6d6173a
SHA256cee6494219ab4a95cce84ab88c6b3fcb97273ae63baece303d85f77c186ac737
SHA5128dabe06aa160aabc298a54f06c43f9a03a120fd6bdc5b5ffa4a65f2df3a5117cfa58f0659fc1a8973862818b35088bc30bb03dc2eb9908c33716bada0bbf3fe9
-
Filesize
9KB
MD58c6bc0be46850a2e426825f6ec8bd023
SHA1517a482317871b7bf0cab619a13e4984a43e4fd9
SHA256ecc43fb68a6328abe78147dbc1ba215a97b887f86cd9fba4ff22c2685fb4603d
SHA5125b2cdf2aaf9405402167f718aeea3763a2d14276d73d7c7209177b2a805ce4fadf1cfb557ca54cb7688bda98214f0be3e676fd5ba8b1576aba4e702fbb23bb2a
-
Filesize
9KB
MD504f536fca777d73dfc92afbceed6d95c
SHA1473988c632aab3089c65178ddcd23efc3e9eed84
SHA256c3325c04bb09168487669b2018598acf4a846a71ee29b1a9d2e8c793adc9377d
SHA5129a980d481e2da8b08ffc9426444016e9b6718b40a55d57fcfaeb7c76d4541d8d4463ded717e0ecbc0d925265e9eaecfe85577bd6ce5112b275a16591cdd16ccf
-
Filesize
8KB
MD5a22ab12071bfb5b225397a8ec5948e84
SHA1939b1ea0a8971d95391546859bbcf5e23ee8976d
SHA256705580580201d412d3ed503ab30a1658b9bac376470d9e9f357d809b56ddceda
SHA5126e3fb694984540e18a3a0ca3fe53253318b282d78a983421a216f89362ed475eb899c32fecde062b3b6abc083f88fd4ec6404e377643deeef87d23194f6f5771
-
Filesize
9KB
MD58f2fa4fbf97124ea225879bce31c033d
SHA19b4612fcd04d81891033fef777b3716bebbed24f
SHA256aa0ed1719f9e88c645db62ee6d252ece9d616547c517c6088b7b5ffa9bbb7f93
SHA512824ac7ae2802f105f96413f4ccb303a8ac60e9ad746645ce4b0c0bb7d8129ad95757eb1f6ec465e86dd7e4de417562a849aa31ae3541d57be5311e50951e3b0f
-
Filesize
99KB
MD55b2f3b22dffcd20f77bc1ef07273a7dc
SHA19d52c546dee88bb889763ec497044ae5a6085e7f
SHA256abc8bec5f1820bf88870d4e079d08db89205db0b60c503b6c217310b5b031d12
SHA512972d4a34ccef169e8ccc6a4da19b8055de66da8f117a34609a12dfcf323d0d5c51e54c8a728e71f44cd900818ba3ba9c63b73e50700dd9b9267096d0690abf91
-
Filesize
99KB
MD537e6bb71484d89078aaf4bff3910ab2a
SHA1611d22dc67dedff900c7e335ed7be0996e4296f9
SHA256da71b39dae9935fec26ef9fde4a9ffc19824b0b4c91af537c6d016c8937290bf
SHA5122304f4aeb020bfc22c754356f48d7fdf63859ae00a680cf28d85554018a3f9ff9ce7525d3ca3ecac7d2f4493b00e363ce87a4037c7bff20acee64bece5147324