Analysis
-
max time kernel
1799s -
max time network
1684s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
123KB
-
MD5
8153b7290c6aaa5999d74301587bc6f6
-
SHA1
e8da9a000dbed03223bb1943d3bcc3bc79c5e0d2
-
SHA256
bd5bc175cdb2f7c3fa592c4248df6b17d9e7b0fa575a3d157867a7e94b8ed000
-
SHA512
0a452999b7c803f9912d36b37221a1db1903ef21b3a442348d8c0231e479e1d923635a67d439cb48e06c4a2b92934bf0fb72e51bac580bf6cd0cc3a866b0e17d
-
SSDEEP
3072:6spOsFWvDJZrFR9+pKfvUenT7nIn86V3fikW:6sMsFWvDJZrFR9+avUenT7nIn8gK9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2172 2148 chrome.exe 31 PID 2148 wrote to memory of 2172 2148 chrome.exe 31 PID 2148 wrote to memory of 2172 2148 chrome.exe 31 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 2852 2148 chrome.exe 33 PID 2148 wrote to memory of 1300 2148 chrome.exe 34 PID 2148 wrote to memory of 1300 2148 chrome.exe 34 PID 2148 wrote to memory of 1300 2148 chrome.exe 34 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35 PID 2148 wrote to memory of 1696 2148 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7f69758,0x7fef7f69768,0x7fef7f697782⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2084 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2092 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=976 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:22⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3148 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1372,i,17241564990232730311,2805080075029475741,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD51478d01726b28bf640c1c0ecf6486f08
SHA17e36b4ae4a3fb0c774430174d8f672a7e7fa30e5
SHA256cce6038f7a7bbe122fed97c5c27e34cc9572fa211e3494231687640bfb8f62a8
SHA512342713b9064342d4dde50007a162d19602f4d744897a9610c43c1896977db7e551b7422f91991d4686bad167cf409bc462eb5f0b60d08c588c12c73f9f94ef84
-
Filesize
1KB
MD5bcfe5c5dd5a727bc928db35259088b6c
SHA14bc6392066758fcc04c24dcde317036017214b6e
SHA256764adcad633f2f544b24e6ece19400b6b354b7522d96e5352ffd8cab577819f5
SHA512396d372d1bd1b35d0feed47c64715fecf0142633deffacb50710e3bbc61bccaa0f8f34c9ad3f7f6cd177e2763a8b5d5ae07f2138a84c3c045860ac8d2ab421e4
-
Filesize
5KB
MD56929aef36e4a3da81b107ed53a2ccde2
SHA19808631c77ec1453ad66a85f4b22dd4140a4fa30
SHA256154b45170b02aa5d379825f0fde32487add3aabfee5acab27cc1b611760e358e
SHA5125899d0a6b3ce1bf33c5cb38e45ae260107fd680077b5170e18ad6ae669c5290bcecb3b687c0a55fb5d87b3d76763fdfb17bd7f0781912283dbac2fbe2f3e248f
-
Filesize
5KB
MD50553ad772e6ac4ce25d001430d82a970
SHA138078a823a4ca597f491873f4484a719ad1761d3
SHA25698e94f3da1950d5df95cc8f89447dbca3ddb4873b12516f956b97434859029b3
SHA512b350b7b6ffb02025344c0d4eecb99288b68e60b4d11ec08922579ac386a5f309cfb158cadb6db9383ea9675d41fe8fe7db5c97e8ed76979a4b377d20d74fd2da
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2