Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 04:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.spensiones.cl/apps/certificados/formConsultaAfiliacion.php
Resource
win10v2004-20230220-en
General
-
Target
https://www.spensiones.cl/apps/certificados/formConsultaAfiliacion.php
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235927715185131" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4272 chrome.exe 4272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe Token: SeShutdownPrivilege 4272 chrome.exe Token: SeCreatePagefilePrivilege 4272 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe 4272 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4272 wrote to memory of 5092 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5092 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2096 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2024 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 2024 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe PID 4272 wrote to memory of 5100 4272 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.spensiones.cl/apps/certificados/formConsultaAfiliacion.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffb17ef9758,0x7ffb17ef9768,0x7ffb17ef97782⤵PID:5092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:22⤵PID:2096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:82⤵PID:2024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:82⤵PID:5100
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:12⤵PID:1856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:12⤵PID:3408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:12⤵PID:2484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:82⤵PID:3780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4968 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:82⤵PID:1480
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,1344686459220684203,817675031060494306,131072 /prefetch:82⤵PID:3228
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\57a6ed8c-7659-40fb-962f-686b50e2757d.tmp
Filesize15KB
MD535af09f82297cf9596bb1b3dc300c6d6
SHA104a45ef985ae9b86929ff5df79be8da14d49f3ca
SHA256ce8ed01396485fa2aabba3e104f75a981220d9564d467619ba2ffb37a81da2dd
SHA5126dd459046bfab8e8aa70d4fba3bcd3f093c5c3ff01fa8444da9f4dbcb9a60074a65ecd31a29ef471f94bb0a51a241dd028db1d6311c2d45fa7e9ff5e0971d0fd
-
Filesize
160KB
MD5f22f07ee02fbeed3958345c90b52b818
SHA12aa44ea19d580589c06c2170103b4d0505e18cdb
SHA256dc1eadf37f70bef92766d0c316d1da7af283b84e5c309a4732d8ed35d7bbfb84
SHA5128473f7cef3e9289f355047689f5a2b82aafc49501c65f118e5b0632a6a690e542eeae45644e77fa5b869df17b05ed138b4183cc93364935b1fa7d89e32fe5d5d
-
Filesize
360B
MD50c888075042f888557e050d5f168935f
SHA142a4c7473d4c166b1e83de69ee3d67879d5c5be5
SHA25641bef431baeb97eb6906b28b6458fc8f5081e234602098a302159e9af0147338
SHA512e04c5454a9594ae52d0de10750fc6015601172a202f2b9b08d9327d905bbec0491e8142b6976fe21bbc62e81a7702b0198df494167205f7e19c0bae18fef07c5
-
Filesize
1KB
MD5104a0d1faf1229247df6f4cd9067bddd
SHA162a4cfcfa06678c08091b7ccae7fa7e3ba2e8a98
SHA2564bb472f528a250cea063a8f6eefc5335b931dca062a6a9f27fc2a6afa28b375d
SHA512c90042377d613ff83bbd711be28d9950ae66706396755f0dde0828e343d23ddd854b22314a656bf64fd3a9d4cc4b892dad6bcd23a5203c64e0a79ef7c3ae66dd
-
Filesize
872B
MD5f09a40419f457ece73dfa6a898b2d37a
SHA15a794b188c7249d469b154c340ce9f6fe05738c6
SHA25627067505fe3008b9f094de8f91192a5433516c047d96ac01cac6b150f3b4517c
SHA512faed2daa449e9affb111a12f3d4ba7b9fc59e380c2b93149f861f06bafd037e25dad8c743355115c19dfd35ca45a133ebb0cb2686da65e2567bba8dfa8524b42
-
Filesize
6KB
MD51a134839bbac633ae0f177bf05a0c99b
SHA166552a924b84f8a95120e9a7dbbced7e377e8805
SHA25668de1bc0a16a7f78b271b4151abe174fb96647aaff651d918dc28faf840b62f5
SHA5129623a5d9e9efae63d7955dddfa00eb89d119c9eba2553dc3700bcc3902d15c7b6320b9fa364fb73b1715859e147f1145f03b43683891e636d4c60452878448e8
-
Filesize
145KB
MD5282bdb2c6b38126683fa20e5d4de5389
SHA17fae10fa1ef46afaf693b9913a10f20596d61107
SHA256233bdc99ee9bef2e1a5a46e469e6dd0656c11b813f1bd4b23ee8e627d0b85953
SHA5124c690feeaa9ae9afa129b6a43daee1143d48aebed395fc3dbb07ebbcc9fcabf71d80d5acbc5c5f843ec412fd3c92984a464f8073669bb76cbb690dad9a6b3bfc
-
Filesize
72KB
MD5da8444e1841700290fed6906e5e1ef4c
SHA1aea282783bde9b8ebdcd6ee364cbcceb0601ee1e
SHA2567e14fcf898c67c3410805f59b2b980b60c94730b579d96eada6125378ce6e92b
SHA5124eba78f9bfad1d640d7c71fed596a914518c03ec540f1ff4cd4087dc1efd0fc6571f6b163cf919e35ed70224d7ede263e8c7f0b61d509f2c2681bf60a234143d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e