Analysis
-
max time kernel
299s -
max time network
265s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 06:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://colchadoyasociados.com
Resource
win10v2004-20230220-en
General
-
Target
http://colchadoyasociados.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245539812856944" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeCreatePagefilePrivilege 2676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1308 2676 chrome.exe 84 PID 2676 wrote to memory of 1308 2676 chrome.exe 84 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 536 2676 chrome.exe 86 PID 2676 wrote to memory of 100 2676 chrome.exe 87 PID 2676 wrote to memory of 100 2676 chrome.exe 87 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88 PID 2676 wrote to memory of 4664 2676 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://colchadoyasociados.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3b2e9758,0x7ffe3b2e9768,0x7ffe3b2e97782⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:22⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:82⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2784 --field-trial-handle=1808,i,5304133610317171966,9479176514925817311,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5a4eebaaf1757f7ec03e0f3180296854b
SHA1c312503d0915097a91add4e5331a07961ea1925b
SHA25622b1c861d4d132889cdc3cd40029501724d3873f1d19da4464ed48d4a51e24a8
SHA5125c669d5bb3cc380143056f13f4d91bd7088a0125a7dc47083b6c17df3fbaec8d2722f99a0fadcf3052a341b07cc9c5e998f72e63fdff9d1689fd929710f45789
-
Filesize
6KB
MD5de84b7b53c5b5e103fda0cec40176833
SHA1098bfff2ffa6ca403b76e92fad8b44b16a8d2648
SHA2569c3b037ab629815d4a61ed209f50c6736d47da76c24004e71771c70ccf00b442
SHA512a2744e7a19a6cc2ef4dd2b2a6f3f87bd2d988bee18d995ea4a51db2e4bdc6f6c17763ee6ef4b007fdc1212c6ae76c2e6b59e3b6761d293e7b4dab04b10edf436
-
Filesize
6KB
MD54955008b8b7df45579de3e1b4aca6deb
SHA1403f1e45cb51e0ccbb058968e9a6c05e0b86761b
SHA256640eae685bd0e0b1dac2e5ce03b756362993cb639521cb15d2322ba8cd99fead
SHA51201bca347d0bd3186e601ace256488e8b1b760fc7c9290539745a0bee7d11a656776862ccb82bdc2644215bdf9fa8947c82df8c9c06ad0ddf0059f9114466966a
-
Filesize
15KB
MD5a65a85f365aec9dd1d3e1c480eed0479
SHA1bfb62c6ce647a352a1ec15ea2fb6f154539723cd
SHA25600109c3f8509ab1926ec3fc6e2a6bd62c2b42bb3bf40e9f268cba6c4f7b9d470
SHA5121cfb5eea230638290054e62e248298b105dccbd9796219c8b77c6709d2cd727ec5d4e0f4068f28cd5b92ab544066e0a4d70116f4d4ab4a025783b14b70feb979
-
Filesize
144KB
MD534a7f714e7c9d5186a6744e8b81e44ec
SHA1d230c67cfd420bbe7b06696f50220d2cd6e5102e
SHA256418a159a6ca8d984e3e008636333960338475b65821e6cf966a55bc1cb8aab1a
SHA512719c12e37f540d33cd32eb241df78b90a1dea383966eb3cd5c302e2a2e895b3f0aafcd03822858349c5fd62b147d637f604cf59332e6d323469f38a266b24954
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd