Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm
Resource
win10v2004-20240802-en
General
-
Target
Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm
-
Size
7KB
-
MD5
602e0585e2452e06bce1e0f8f7c1ed7e
-
SHA1
1029bd69a2e043600f05795b885d55f3c9757d64
-
SHA256
32b622aed8222dcba16cc876a07385a64f518ef1137563d9dac472c17f4d33e4
-
SHA512
2cd49060200ece9be49921a984396ba90f150d3300357cac7436568b8df5d61868d6eb879f2a38b9ab0a3a51a848dfe22d6e7f9d57e0c9fda933ff80e8bd9dda
-
SSDEEP
192:Ko4aiKe+jwSNERDouKbsvELvtW2LJOER9OsIV:KxaiKDDE9R8svELv02LEERjo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133712017086221666" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3944 1936 chrome.exe 84 PID 1936 wrote to memory of 3944 1936 chrome.exe 84 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 3676 1936 chrome.exe 85 PID 1936 wrote to memory of 832 1936 chrome.exe 86 PID 1936 wrote to memory of 832 1936 chrome.exe 86 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87 PID 1936 wrote to memory of 1336 1936 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffad63bcc40,0x7ffad63bcc4c,0x7ffad63bcc582⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,14966803534315329033,6457007574016481167,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51a63be48b1197652b6bb624e5247b0f6
SHA1f2b5cf879fa8232c5c115a82101a159da968e54a
SHA25603c5061ee6e88ca3cd6726e2cc50a7bc244d0b97b9acffa11bed5411186f5106
SHA5128ff7d54aabe84c2585d3004c1a8aeade6b7776ff4152e4299b1d3cae124ef1c84a19628ca52ee096ddbcb46c5a02e1ab967f0bc1098198d2ea97279b86a98379
-
Filesize
1KB
MD5dbc4f3dcba4052096ce319abd5d5c419
SHA120e1e25c855c3c8e82e43f53f840969ce8ea3c7a
SHA2563b812cc75797b9aa9ebe14b05b20586e1e3335c4969e82872a5b11ac804dd0d9
SHA512f784788ab3aecc582580aacc7f7a170d3f533e4659da7982cf22e7210297a72c5ac768feccea50e06861ccd222758535450e438bf28367b057db8c794a103e0f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD57da4fb46e0ec81bda32c40bf396f63bc
SHA11c9eae520cff72e17bc9947a7c7d2b28572da835
SHA256d004c2fb9a339bd80f6a669d45198fb38818415db63564c6611a1951ac2fe10a
SHA51243a562d0edd98a12aec51f77d3929618d0b3c925daeb808eda74451943855af5e263c7ae293fa87792a2f68ab1a443022affe28dfe364cd1ea449b317b6688ca
-
Filesize
9KB
MD5baa56217d320d79d75d3e435581d06ad
SHA1a4da48c930fb56ade98d9b2a7d8bfe247cc40af8
SHA256148bb9543f25bbc802b2235769d85321f01b238a58d676920f67cb85623ab6c0
SHA5122b2177f656322e23e1879c18969287d489751aef9a6bc74d41ae7ed67831c996b6ddde7dd719c7fb3c600e5611231b8054675f6ee80fd63fac7a1a4ef7e9a438
-
Filesize
9KB
MD571bd9ee11df925d87c80cb0a389dfd47
SHA1a5bceeac13fedc8edce538ab7a5a74acaad99878
SHA256f8f3b33a3dac34aac211b03d1aa78b3187fb5f66f98d45b7c6bc84568bae3a05
SHA5120fd3f92f553bf314ea44418bddce848fe031b26871ce91d5fbf9894122e98dd74961c6be73a1c2c8192776dc8e59ee6fbfc735d0272da3f729ba291f02c23aab
-
Filesize
9KB
MD55ef42d2385618b9eab0373c28dcb7e8c
SHA1694930ef1ce33ad7553b82d58f50b29afe23c04c
SHA256af7e3e128afb46191702ae149173ffeb0fbccc5f6d27caf420f72cb8a031031e
SHA5122094c1a034844a2cf7b9ea2a5468202caafd82398d3f95feed151298deabf0b5bb3e56a420b672c68d1e52830251466924efe74f9384c0d98d4e334989392a60
-
Filesize
99KB
MD5869c2b7c8a4b447a4d7c0e27ea1cbaf5
SHA1622976265d8923a40e2aa7fa95053833d3dcc157
SHA256de128a2616eb46a1f8858ee2a835ba5e6dd4283d5793a164d0fe33b0035f0631
SHA512f0c71a500054ac51182e761bc62cf6e0accaa0be8d26fe9c7c8c883b9a25f81e4c0a239ca15868f1506427e8e82c7dce0fa14fd6967c38731426da1164fae1f2
-
Filesize
99KB
MD5ab395f8b243230db3997dc1dc25d1452
SHA13783aa84d976a623dc75f8e450247b913d1e35df
SHA2568b87e509b88a1ab6e72074c3430db11c7e3e9d5f51a2466edb243b2cca63bd1b
SHA512189c00ac99110712dc092b362e639492ffa38151c466540f520c3889decd350570dcc1c5dff5f0bfb130bd47d5a7162a31c1f8c53feae2aab7d1783b204c5313
-
Filesize
264KB
MD59ce7cce492f92716ae4c098c62d8d930
SHA1491146138162027b12513d15ea3978833c35d150
SHA256af27fb2196403ddd570b583576cb427eda4474abbab232253128265d73d48f97
SHA5127f9afb672d8163c501fe7c7ce13434564230b418ae03375172a886aecd3f8f613fbabefe9984ca2a04c2c62556ed2c46ff453b225d656ea389d46f5c3e3f4311