Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 18:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.topbuildersolutions.net/clickthrough.aspx?rurl=https://bellsouth.cl/wp/lp/?ga=a2FyaW4ua3JvdGhlQHBjZy5jb20=&cid=1577991&eid=4070
Resource
win10v2004-20230220-en
General
-
Target
http://www.topbuildersolutions.net/clickthrough.aspx?rurl=https://bellsouth.cl/wp/lp/?ga=a2FyaW4ua3JvdGhlQHBjZy5jb20=&cid=1577991&eid=4070
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227766826661073" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4600 1384 chrome.exe 86 PID 1384 wrote to memory of 4600 1384 chrome.exe 86 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3136 1384 chrome.exe 87 PID 1384 wrote to memory of 3688 1384 chrome.exe 88 PID 1384 wrote to memory of 3688 1384 chrome.exe 88 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89 PID 1384 wrote to memory of 3160 1384 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.topbuildersolutions.net/clickthrough.aspx?rurl=https://bellsouth.cl/wp/lp/?ga=a2FyaW4ua3JvdGhlQHBjZy5jb20=&cid=1577991&eid=40701⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb72f69758,0x7ffb72f69768,0x7ffb72f697782⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:22⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 --field-trial-handle=1756,i,18249995501034870192,16257863412124065909,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dd52a60490370e4c1478bbae12e5f677
SHA1d5b2359ef53055a01126ca7534c082c03c974330
SHA256ab52afd11247d36b8e447a91f5b5e1b33af99d6d2727e48396d6c3dc2c9a0cf3
SHA51285d94819eb677cb822a56c40435c7563bd04b697b0cc6eae651c9229cf11a773b914da1674f348223b09f3f5836ec9e8dc5895bec174eeff3fcf70894082c3ba
-
Filesize
6KB
MD56d1e62ba35b344dddf7e2858b70791da
SHA1bd61eeef18e911eb6c82de30595144df65f1dc62
SHA256512ecf0588dd722a27cfa2b2c01378f9e8fe78167fd2edf3dcd511812995bd7d
SHA512aafe00d269268cae75e1f477530b4d0c7fc49ac2a02370addc5acfa322011a9bdb6d614b1c96fc1e918aef8657c5343be96c9ca19d37b5fd3068f550fba1fb4a
-
Filesize
15KB
MD59d555e30f4e8f16ac60b06b18570801e
SHA16c17b72db53d55b70bd0d1b1b87dbc1e8bdeadba
SHA25616fc05ee3624a3bced461d330d95891394cb4de5d2e4e35db2e93230d8e7148a
SHA512cf1ed327ee797a39243152c7eb02ee6ec91b80ba61ac50aa7b83cd86cefe8f447adc93dbb848f30e21dc1f955b3079bb982b87001c6f91d94a33caded23f2cb1
-
Filesize
143KB
MD5a922d8768345f9a6139a2ebc30dc8164
SHA16946c9a7fb9f2045e271b01e20a751690e19b65d
SHA256aab0cabb67c3eadef3434f2ebbb07b35bdfe0e1c3fee1c864077ad047f6caa1d
SHA512aef597e0212ffe9251dde00fb254152a2284fcd4edae81e3b4692906c5124180ad255504a063f3059a62cf58a52713aa825860ad729c082584f7c130c93dd461
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd