Analysis
-
max time kernel
600s -
max time network
492s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 01:16
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kfp.cl/wepok/wp-auth/lgquk6///[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://kfp.cl/wepok/wp-auth/lgquk6///[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240077996655632" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1428 chrome.exe 1428 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1428 wrote to memory of 4340 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4340 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 3848 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 2576 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 2576 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4928 1428 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://kfp.cl/wepok/wp-auth/lgquk6///[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3bc9758,0x7ffbd3bc9768,0x7ffbd3bc97782⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:22⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:12⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3688 --field-trial-handle=1812,i,16733688357444284677,17749710937876505016,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59be3c73a973875d4677b70ca934e7763
SHA1b51e22f477d20b53329a9fe73721f0851463f38a
SHA256c4f1f0468b020d5724b0c8aefa0f136185b2d29b0cef9aca4ad6ea356182ca7b
SHA5122ac841709404e937b26a07ae84e58f2f72ae31c3fc26a8ba07f827cdc126cd09bd399562b7e8edc4796d15bb3aeeb914492343b04f82319a6c48288c71c18f8c
-
Filesize
1KB
MD51e3c956ecd90f28706640c0ba0d28d9f
SHA1a7e0307a564db42b4f16189fb7331787218dff15
SHA256a77ead18742b91e89879fc1fc65829a79f685969ff8f061e10c5f7b98037c169
SHA512891fe71c71e33970407db4df67bbe9af13e735f9ffdf3f3d61dd171ec7e24d1d59664fea222be3d80e9ac11efe128b766e4b17e8e3e30129bac404881812e449
-
Filesize
6KB
MD592c55d8a7368eeed200287a695ea3f44
SHA1565ab6699a69c9b05a580d4321afbc0aeca9fe32
SHA256a9082136e99252996e80b84afb99fcf3a0ca343c4855de9cb9a01b4f45857d2a
SHA512e55788c716624a44110767af8b1284e1d6fd900f7e61de650ea757b160beac3e57e29ee49ccc7d57f58c6bacecd5e3568f2ec85fe3de8915b3f23eb79018a2f8
-
Filesize
6KB
MD5d6de11de4841bc31dfb9970dab312e0d
SHA18707221fcad9074a24ea6bfc45fa2b2359b71a49
SHA25653499b92be54b0ec01b4a599b38be44528613d519c536d4dd690260103aef338
SHA5124e1cf3d575e568ed38499e8354cbd2c02b9b7dd98377894cf33e1e135c3a4754238621f08706c0bf98e016bf7f38142f7367fd0f179d628cea291ca2e46879b8
-
Filesize
6KB
MD57bef32edae184046cc2330186ce94ab3
SHA1a12de0aff5e01da459f4684b0889310d72cccbad
SHA2566e2f808e4dc9dcc4fde0a91fc5feb1661ba3c8892a4a405a5be702447861f3d3
SHA512a2ac359de4081cc3366b7f0a8215673415df9fd60647f4a1d58358ccb0ef1d55c094215717499db62492993242a82c79f06d20d6e8498a42334a776acd85ebcb
-
Filesize
144KB
MD5093ef389bcd6eab8c0860f0d2561def1
SHA1a4df2d9d22ad66817eb84d9105dd68873b0ba64d
SHA256038cd6dde0c6795d575cbec19fca38e41b9f316aa95dd0e6fef1c71732ab95be
SHA5125a0f138a50b0fb6209d3a72a63aa2bde58269e8f785baadd348a12ca64b721a82a58d9a00b8028b03068a44a784e3408bbc9ea038dbb261bd874ebc4e4a7ba4c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e