Analysis
-
max time kernel
100s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-01-2025 11:45
Static task
static1
General
-
Target
6386964172.html
-
Size
21KB
-
MD5
01b1cb3f786b3b2e00ccef5623228148
-
SHA1
dc7ad30c6f5c5d495f68eb247a7a33a902df4151
-
SHA256
fc16aca65e569048e1b768dc59093f9737f6d32f5a1db75182468f804f9c45d4
-
SHA512
453614e9d39156a1292a476ea2c58fad05edef6b58eb7d5c4c42430d74530d3f314679388c94ac0193bbb71b669c76a5c5a381ee2b40f748735ff61f5c36b05d
-
SSDEEP
384:EIbRBaATO0ZDgVKiHuKKzzN28j4Npa7go:EIbRkAlZEVKiHuKi53jmsv
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817607650550950" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 692 chrome.exe 692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 692 wrote to memory of 1452 692 chrome.exe 77 PID 692 wrote to memory of 1452 692 chrome.exe 77 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 2456 692 chrome.exe 78 PID 692 wrote to memory of 4812 692 chrome.exe 79 PID 692 wrote to memory of 4812 692 chrome.exe 79 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80 PID 692 wrote to memory of 3476 692 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\6386964172.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff989cecc40,0x7ff989cecc4c,0x7ff989cecc582⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1708,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1720 /prefetch:22⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2000,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4492,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3664,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3352,i,4552994433841467311,2674768410298978829,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD597b376795976e0cbe428f57852536c46
SHA10a5236dce6b0fc3b347249de814f64291e5b645d
SHA25650010ad79154b3f8cbe69f1abc62a84bb67dfe1007d17a1a2650fa3773105074
SHA51232eaf9afce55d0b0d208e5b7eebf7bd24257e9f8114ad2d9b0d1b8edab65f1a26fff67ce7c5f2c45de764bd0bcc4a447a037330cff2fbd881dfe961e1e1e552b
-
Filesize
456B
MD588d141a01dbddc528c72f84d487728fc
SHA1cd9550f3de9d0afa8cdce6323496f6e20b05aaa2
SHA256e9f08318ea0b69249adc9fafbfe7fdb17ad32002e9bf0ada1f2b397df2789e80
SHA51234aa2fc9982ed0e5fb9d7d3f1bc05bf3b921c8aea4d59f64e4305177cac39c71ef4946370314a688f09c47605d9413423fdafd431e6b4b839d3efd717f736283
-
Filesize
2KB
MD529d5691bb5cb1beb7f9b363a83b472ac
SHA1560961e24bd9a59ae2c7bb59b5943261edef86c0
SHA2569e2258bb2e2d7d68a9e1bde9dd9255194e0599b034bef5b142160d689e436899
SHA5123ddb624edac256c3a2ca6604a4370ff943f86637dd8d4c9c9e11f41d19412b16d9dc04a578d24f4633102193d12c9b66a5e7c13a1e1c4936d948864f2162c12f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1011B
MD542cd88d4f90d22453366cc2102f07482
SHA11c3437c1041cac09df7c8aeb66977a207497743d
SHA256b4dc8344cccec90aca247b5251aa4abf9bc401a1a2f71cc5c9c140af009790cb
SHA512b892ee928e5f10c232f1d4226834197551ddcda7782421e9a7ffa6ccbf48ae34051f7bfcf14a4153bef6ffe490dbdd4f80d50cdd7de114e6d969d4009687619d
-
Filesize
10KB
MD5b051de328a1fa8ef5642c1b7381b2877
SHA1d5dc5bad2a440526aceb78ecb4f28de5046e7ff6
SHA256e30de3df43e0b15c64cef5dbe088acfc4bc9292204da149e6c2aaed480fef19b
SHA5129f8783b8d98bdb11f8ba34e04b853bc6130601e269cd8b0c91dc88b2361fbe03489e5c3ea9cf5d1767d85d57c434f73c7768ff61fa6b4d71ff19f151fc09eb24
-
Filesize
9KB
MD5abe9e9f62177cf2149aedb6ab45d6ad9
SHA12ea3588d71de3e750aa16b66aa630d6027967103
SHA256105be48e8dfcd4532415b6724eed161aaec014e70088f39db2bcf5fa703aa416
SHA51222ad7fc824a3673a3fe2c9a522c7db7830e021f0ef849195fe870362d131f7a6b3383d2fa9b164d5570acaa535a0bb051961d5737f2a85e8f28226e1c0a9d81f
-
Filesize
9KB
MD591320399f180b03ddd6ce04c95d03e0c
SHA141f8704bc4336dbd7cdda1b7b543ff84495319ea
SHA256609fdec9796a12721f044409931f7b1c9d9455746b0ee923594a11fe25c22441
SHA51260351123b59658305e13f24848734e0c1856ae0fc0c7fc3683a03989bf99e978b3e142cab3de776e498265063c58f78b6ef78be8e0e8cc28b5e6df7f93472ebb
-
Filesize
9KB
MD5cec3f4aa4e0a86d6f6fd85cf0e801aa4
SHA1f27de7ccc910d42a9131342e82ef81549b053bd3
SHA2568bc559000b1dafe0bf09f733b0c4dc543bbd5a4c7219e58face0f37f0014ffb8
SHA512a84b0d446e67a0b1e1064d6d3297ad565eda9d9b5544a8190be9a839999dc24516d7ffd5606d14954993b42f725e7b30f9891717a7e3819f88bb7c3d857fa2ea
-
Filesize
10KB
MD58a9944598c142d7ef10a7c535c6b70ac
SHA1b0cd7cda5ff994b779a711b837f20114e4cf0694
SHA256e66f5bd8155348c632dd5cdefb76e93ce6d4b312c9d67b4966ea88f416ca63a5
SHA51250c94336ab7d8a0522cf7607fd22e09323f3a28a566b5288a3c7fa15ef862724581d0392482d91855c0189e2fb5811790ec2828a5e5296779eba25a56f754fac
-
Filesize
10KB
MD52c558cff1a6628fd6616d8ec5cbbe189
SHA13c16717ecf6291de26c70d8e91859905d2d3e768
SHA25620fb908b60f9ab7deb15da83180e28c793baec8bb5a6ed626c7f8d02c2b1eba5
SHA5123ffe2065c1d9b813f7add0ce8fb3cff16a10a60a749af44b286a7721d332486a3bb9f2f6416313c9c229bc0b5d97a5055f224c596b7e3e5cec16e75e5fb57993
-
Filesize
228KB
MD59f5b11b0147372bb4b2e95bcd0d996bd
SHA17bcb3258ce96e0438529919dad5a4c1865b602f6
SHA256068cd4b6bd92bfda74bb0831fe6429bbbd9011985819358124463680faa0e035
SHA512763638714e20f2d3cf4ff1246b5266efa221681a1c240247c9db2c88dd2e23ff7179f2eda21a2e9ded2de33bc2024b129a69397709a38d60d0a36613b6c65e11
-
Filesize
228KB
MD5c1bbc88b1be66201c457c3d2894c4bbf
SHA137eea156bcf9c763f1d560273bc386fb1354c2cd
SHA25661f9c6f4927dc178109c8756f4bef12af430a5a5e9c4b72e92ab03db280dcfc0
SHA51202ce1a2dc156c8bd5800e04ebe9ddcb11c11b2ce32373875f1180a769bd0aa874d391756a38f11444b906aa58873ffcdf5d47046c7827ac44c2cead422001807