Analysis
-
max time kernel
12s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
Fattura di marzo#1759.pdf.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Fattura di marzo#1759.pdf.html
Resource
win10v2004-20250313-en
General
-
Target
Fattura di marzo#1759.pdf.html
-
Size
4KB
-
MD5
a9515de721d9bb6ac00b5e20a4597e99
-
SHA1
80fc227afa2b8068347205d30796e305ee7a7350
-
SHA256
f8b73e966bdd1ba5fcd33ff8cc0bf6d470e09b1a9d041ce8bee33ec9877f2786
-
SHA512
f919071842ac873d7e2bb80f93ac27ecd83a7ce7adfd00c30460422c3c8d4ce6771729afb1e32ed16a015e0edd9a966354dd35b2e120f0a11679e0a07faab05f
-
SSDEEP
96:WXFkPgR7l2/HnrBRH5JTdRH/FOdz5jG6/:MFkPs7c/HnrzZJTdt/F6wY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3008 chrome.exe 3008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe Token: SeShutdownPrivilege 3008 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe 3008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2552 3008 chrome.exe 29 PID 3008 wrote to memory of 2552 3008 chrome.exe 29 PID 3008 wrote to memory of 2552 3008 chrome.exe 29 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 1720 3008 chrome.exe 31 PID 3008 wrote to memory of 2976 3008 chrome.exe 32 PID 3008 wrote to memory of 2976 3008 chrome.exe 32 PID 3008 wrote to memory of 2976 3008 chrome.exe 32 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33 PID 3008 wrote to memory of 1048 3008 chrome.exe 33
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Fattura di marzo#1759.pdf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb369758,0x7fefb369768,0x7fefb3697782⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:22⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:12⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1200 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:22⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1380,i,5812185320040566587,650033642715528041,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
4KB
MD57b2625f73115a8d62b19f4c2561537dd
SHA1ed6c8b1fce63fe03a0d05b15d4813d10716f0777
SHA256cfe3c61a322b901d5bdc93edacbeabe2478f6e7a16edfcf406fc35c5ce02fd79
SHA5125ddc43910eca84e2feaca617db708a67034d2123c885d38768b4fb9f4ecb5694ba098b137717ee0d895b80e6ff370cc752ca53faaf9b736c174af7a399a47446
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc