Analysis
-
max time kernel
6s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
Secured Audlo_evolent.com_0482840555.html
Resource
win7-20240903-en
General
-
Target
Secured Audlo_evolent.com_0482840555.html
-
Size
3KB
-
MD5
810f1057d61b594cc4cb049123e656bd
-
SHA1
81a2ea2fb0ba6e2a0f10fb0a70753ab3d75a8673
-
SHA256
41a68709513422d964d84ad386347585a08badd4b24bfe3e1457bcaa69bfb923
-
SHA512
3fc0b025c27554c000a1783c143f13046f9130a9f59d230fc9d3c692fbe5c4476cef3e1ade8e5e7b171156ccfc830fe48c1a1ffd718d95bcad514d48f4f61b5a
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2144 2644 chrome.exe 30 PID 2644 wrote to memory of 2144 2644 chrome.exe 30 PID 2644 wrote to memory of 2144 2644 chrome.exe 30 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2664 2644 chrome.exe 32 PID 2644 wrote to memory of 2548 2644 chrome.exe 33 PID 2644 wrote to memory of 2548 2644 chrome.exe 33 PID 2644 wrote to memory of 2548 2644 chrome.exe 33 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34 PID 2644 wrote to memory of 1204 2644 chrome.exe 34
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Secured Audlo_evolent.com_0482840555.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef8179758,0x7fef8179768,0x7fef81797782⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:22⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2232 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2240 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2784 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:22⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2428 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1364,i,8597490702725516182,12057827283186781853,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1008B
MD5d8b2da49b943a26d6a236b8241003ba8
SHA18147e331a4bfb11a54d747a3805c9b2483ee5e4f
SHA256a51ec931cc2e3369dfddcfb4ba5304f62860b73242340233feca08890fefcc81
SHA5121e44965cdb27ae536978b171b0da84fd1d71bbfefad08e67310a7ff20ae4b33f7300859c151dff9b91fbad01f9faab2e91b8c0bf67b73848176a123b5132b92d
-
Filesize
5KB
MD56aad4019c2f7d97f0a4fa35c97ffa6f9
SHA1935b5f2cfe5647ad6fdcfbf17f9e43fa850a30b5
SHA25624d65974b97831e5027adaef3e045b893a860159cdfb6d797d79c3c11a80bc31
SHA5124ab7d95d4abb5bc678362cc50f3d3a01a4bf96d0520a77f6a6d4af1a45df42420920de69d619c3dd1ec6cef6fe1cc0d1223df7cf186e52a4b48f3fc2ff341360
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b