Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 04:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.spensiones.cl/apps/certificados/formCertificadoAfiliacion.php
Resource
win10v2004-20230220-en
General
-
Target
https://www.spensiones.cl/apps/certificados/formCertificadoAfiliacion.php
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235925895471052" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2472 chrome.exe 2472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2472 wrote to memory of 2324 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2324 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 2528 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 4212 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 4212 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe PID 2472 wrote to memory of 3888 2472 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.spensiones.cl/apps/certificados/formCertificadoAfiliacion.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffcd9ee9758,0x7ffcd9ee9768,0x7ffcd9ee97782⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=320 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:22⤵PID:2528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:82⤵PID:4212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:82⤵PID:3888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:12⤵PID:3488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3240 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:12⤵PID:3608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:12⤵PID:4756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:82⤵PID:4956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5420 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:82⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1864,i,2533372951511587343,12906487816173161902,131072 /prefetch:82⤵PID:2128
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f22f07ee02fbeed3958345c90b52b818
SHA12aa44ea19d580589c06c2170103b4d0505e18cdb
SHA256dc1eadf37f70bef92766d0c316d1da7af283b84e5c309a4732d8ed35d7bbfb84
SHA5128473f7cef3e9289f355047689f5a2b82aafc49501c65f118e5b0632a6a690e542eeae45644e77fa5b869df17b05ed138b4183cc93364935b1fa7d89e32fe5d5d
-
Filesize
360B
MD593d145646cd777ed808b53397592fa34
SHA1aa566f30f1a1bcbf3e06e3c4aca5e6d173051e3c
SHA256483ceca65331f4c8ea42c342faa4f1a07524e2a03a73536139250ce0466571b9
SHA5123e75d062d41d132ba1536932e781322c3363c78bdf64002dc4937c8d7d20577cecc98e438e82f528a86a8143926f97ffb22f417c097829b5beebd72b0dfaa05d
-
Filesize
1KB
MD5104a0d1faf1229247df6f4cd9067bddd
SHA162a4cfcfa06678c08091b7ccae7fa7e3ba2e8a98
SHA2564bb472f528a250cea063a8f6eefc5335b931dca062a6a9f27fc2a6afa28b375d
SHA512c90042377d613ff83bbd711be28d9950ae66706396755f0dde0828e343d23ddd854b22314a656bf64fd3a9d4cc4b892dad6bcd23a5203c64e0a79ef7c3ae66dd
-
Filesize
872B
MD508e01f60adb66235a5b381223d238a23
SHA19349040c5975ab6364facbb13b026c25b5635613
SHA256a2333a5853dd0db25d9968e24e1ba14db5de2af0eed3cebcd08009a989d92fc3
SHA51200094df14e4c31d416ba60b03f8de70d1f10440711060ec77d34e7cf1522d339013d248452f8b1ceff3bf82ce1153c34451a1c53df06e2813d95c5f39d377850
-
Filesize
6KB
MD5482e25bdb6fc383086806c7f55671fd6
SHA198252f806e3c0baf71fb9bce8948cc026f1f7785
SHA25668ed509d0f077b1206e66a25b8dca327fb55135bc6864074729249f102411300
SHA512551ba0de50de8919bb620e8f0cad913825b8d66645c754f3c964bbcdf1029c46d32b33902eba376fa8d8bc97807b3aae500d6215ccd88c4f11e0f70b0e515c69
-
Filesize
15KB
MD53441e82891b94c8ab112716c69e45fc7
SHA1a06f6f63d56ecd86e793a8a82c6783543014e97d
SHA256cfe95caaba2c0fe417df8c7611ac04a4aa58866defb484896ae79edd317d90ce
SHA5129e475fba5b5b00b0bf785371c8b4159cdeab0b96a4adde63f8dbc534605ead2701ead404bad7040542571caad5ee6c909fa94327372e4d690a84d74555c103d0
-
Filesize
72KB
MD5fa3a8ac1607468842c3698dc57e13254
SHA192a8f58f5f97f7afc5968d7be6d045dd4278037f
SHA25670a72329eece1312e699d7e4444f1e75a07ffe96990f079202b6abd8a0583081
SHA5125d781858f62628f99c555c6d8f790f30a646fdfd7a4a0ef5c971b482e3a805b541ec9ab746b9a70755ab82e1879fa66210e1e46c3689ed3c0703baafb5848aab
-
Filesize
145KB
MD5243321346cdd4e136f7b4c504aa5cfcc
SHA1833a821d9114b5e6713a7b6d955e5cc5e143e110
SHA256fbc655173c5a5ad3c6cd966bf3e548f98cbb622c601148798407cddfe8c53ea7
SHA51295922b3af58e197ba0d2445cc8c9edb30be199bfefbb3627099f7fcb236f6c39744664a6c7010e2cc9aae04bedf331366b79bd72c6899f151e28a805dc4fac55
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e