Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 14:52
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.latinocargo.com/GYHS/siddhanta.suryabanshi/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://www.latinocargo.com/GYHS/siddhanta.suryabanshi/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237147461743147" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4984 chrome.exe 4984 chrome.exe 5076 chrome.exe 5076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4984 wrote to memory of 4212 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 4212 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 224 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2140 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2140 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe PID 4984 wrote to memory of 2388 4984 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.latinocargo.com/GYHS/siddhanta.suryabanshi/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcae799758,0x7ffcae799768,0x7ffcae7997782⤵PID:4212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:22⤵PID:224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:82⤵PID:2140
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:82⤵PID:2388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:12⤵PID:4532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:12⤵PID:5072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:82⤵PID:972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:82⤵PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:82⤵PID:3012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3736 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:12⤵PID:1436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:12⤵PID:64
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1872,i,17971217623885253191,11836293848890393749,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5369573aee6c6e401e9b305624c31849a
SHA1813d2d58d0cfebc8cdb450b0d0018038af3162a0
SHA2564845fb45b43ad9e85254e81e81d8db11168ab7d680a9984545cec68b8d05ea65
SHA512b8b3ea2785faaabcd84c377f23f0dd0782ba4001f95603dc297b06cba3d49b7d7e150f947fdee315d651f2b9f41c0b88b7ce7f4f2a44c84bb9225a8c6a91ddad
-
Filesize
6KB
MD5d1c70081e0d76f3799f79189377c3b65
SHA1b85f57c629abff177b6ea253da075112d24e4ddb
SHA25659bbd78c6432168ec6e1f4642a24fcb4e3d6252cec6a91d340a0876487fc2a20
SHA5121d16d816d96c02b4a8959f705188eb0d79ac2b8d711cd11904cf2053a5730319835d79d344d74d8a0fa2e441001b1ec79f66e9b2050b19b1a66d58d474ac0019
-
Filesize
15KB
MD5a6e33ffe70cc5ed1f2bc9e0488853779
SHA1e5fbe82e4dfcaa15f3a015ef2b60dca458936607
SHA2560b305c2b525b89b7bd5947517c3de7ad4bc081caeb3f3564fe4c5c77a82f101c
SHA5127e4a3d256d5f3a21e7ddb381b5f304edf5fb974ad960158f28a90c760c52c5917d0879822b46a6d27346c4c6ff4ac958454b25aa410081d06d7350b50aac2dea
-
Filesize
143KB
MD551f981ad14afb36bad7a98ed300cbfb6
SHA161a6f18cddcfe860c160c789fe2e367def042678
SHA2563a8dd5def8d88e92ea1e90176492b8fb466b2c16bd7fe1183ee109ca333d9768
SHA51266479a1abb0aa2840453375133aefa0b1ee9fe008801c7d4ec81afe248f9236ad139545a3860f69a23c88b37d7bf7a683f1e8055bcb7848544c474a968074a6f
-
Filesize
143KB
MD5f644e9086997ae980a38e857de91f3c1
SHA174ed640ea2de55d363197227ecc6d0c2c6a3e68e
SHA2560d726c5f9d9e48850fdf5f13f87fe4a56f0d89e6ee0771c0bff1e7b3bd709575
SHA512a8c8bc9b21cb44abfe47313c22efafd397d4edc14e61b1dbbcaf11df00dbfc74d1a5a741e966fd13ce87bb52968168ef007801e7d3cc58c7ba40653dcee16cde
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e