Analysis
-
max time kernel
188s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 18:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mrjackrj.com.br
Resource
win10v2004-20230220-en
General
-
Target
https://mrjackrj.com.br
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226893685155155" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 1388 chrome.exe 1388 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3856 3056 chrome.exe 86 PID 3056 wrote to memory of 3856 3056 chrome.exe 86 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 2632 3056 chrome.exe 87 PID 3056 wrote to memory of 4048 3056 chrome.exe 88 PID 3056 wrote to memory of 4048 3056 chrome.exe 88 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89 PID 3056 wrote to memory of 1064 3056 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://mrjackrj.com.br1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff999889758,0x7ff999889768,0x7ff9998897782⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:22⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1816,i,1641701740838590276,2750177681566918155,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD521c37d9fdd17b945cc47b6abc031da46
SHA10d79e8d21b0fbd3bd9a9acc9aef807a219d562de
SHA2567285cabc7c837931e3aec64b07bface74b5d2360a348a102c43515e170e37fa7
SHA5123089197f813a3fba063ae402ae9859a93890622c549c9989d9caa82c58d46f76555e12cd53e313fce2c0c0e40943854c6e228b1224dbf31dbd1a706eec0dd372
-
Filesize
1KB
MD5852787b31b87ce784723461f89ff23e3
SHA121fabf29240aa0430073f4cc70344c020ccab59d
SHA25695b0b0e9d2f83308f5fccd22dbc6557b098fc93bd5946cea53cd91372bb5721d
SHA5120e2d7e209d418620d3d1e484c20e621d55597801e317a05c98da6929fa7ce7ad8bfebea4c37ee4f338023c270d014b9d7d47a6f361974f9d994cfa80844f4221
-
Filesize
1KB
MD5b41293672d7e1889fda740f3172dde3e
SHA1f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe
SHA2561e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e
SHA5126c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147
-
Filesize
2KB
MD5d1145a467d3dcc0135bda8d27e99fd28
SHA18055170095cea8bb7dd9a3287c51b772d293073f
SHA256e212a04a970ddf17cf3951e1a4ece34fd9b26ad19b1e640faf26684f0cad0bb6
SHA5126fc3a90502ece3b012c0789900462f06e9d4ba2b243ec701f3d58ecf2b7ef32329c4ae8f61d57e01780eb0745638040071775e5bc7aa391d19c64e00fbfd071a
-
Filesize
1KB
MD5f6850e587a9ebcf31276426b08a93029
SHA187f605e6654ad89d1f20bd07a16cbd223c79b061
SHA256126ade266148a2eb8ab3c198e6ed4708cc3aac08a5ff0bcf217dad29f91d3b75
SHA5122d301f63c4b18efabfbdd01b00aaf7a052e4f6de5560604fcf350b8af56c1a1fb6fb12f14a4471739e4893f686660d47a74fe328b1396070654aeae49bda03ac
-
Filesize
4KB
MD5f8692315dde96a1a1ce1c37dbe3608c7
SHA1a1c6e5cd2560e0d9c4830afda059c1b9ce166af0
SHA256a1fb4747d6d4c56742f8f20d2ac5293d1e802b58fb30366d8576a53854b72e63
SHA512acf06cf7944ff446d209a98095a9496f32f106c8eabdb8110ab8ebd78fbcfdf31803a3ba654c277d0be03f8f6e7701400037c72428c961862bd027385399ae66
-
Filesize
4KB
MD58a819f5c53b66f752b1a7f51b7a36baf
SHA18facb0f1ad9c2178f9f8c242b2834520712b2bd2
SHA2564be21725355f887e099736fc83555c35be216c86e0fe242b5a5f6650365b64b2
SHA51218bff073011ab9af9aef47690589eb4fee74b5249711b870dea2cb47c7ef71e832f9edc970dac329328cff9fcbb573eda2155e9a7e59bdbecbd56cca181977b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e2fcab4e-e9e1-4c7e-8c90-5eb8d8ed8cdc.tmp
Filesize4KB
MD569d8a7e8e8e9dce44683a38eaff6552e
SHA18cfaf5d236105f22027b4a9306fbbba31d1c6bd7
SHA256576541a8d77e41b37a0a0d0d540249215f4b650660ff3c9b72a17df90194e630
SHA512105de3fa488d34c3045edcf4c083da0234e1810bb6371f8b47b17cf25b7763faa057d421ec3cb228e6b3773d0d094cc731cb53d70d1637316a23697fc93ae19a
-
Filesize
143KB
MD52dee22fbe249e94b4f27719b1df25972
SHA1424770f8a032636a65d4edc7e30cb25e5aef1dc7
SHA25630f9970cd0b0ad54a91c04e0d4cf99a7da2ad29db9f0c53c3dd5bf0fdb9e26f1
SHA512a01b61bc81a59d4e6da6d10acd721e7285f7031626938d34cc2359728a6eb819c74c0d47e5daef19fb52ce68b718dab88b59ae0363c6069ed5f3afed478364e2