Resubmissions
26/05/2023, 01:58
230526-ceasqaea4x 1Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
26/05/2023, 01:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://satgt-my.sharepoint.com/:x:/g/personal/mlboteoe_sat_gob_gt/EeizMxdSrtBGqA64_SS5WfYBB90o-tH0FzF6juHIwWN_Kg?e=h6ADNa
Resource
win10v2004-20230220-es
General
-
Target
https://satgt-my.sharepoint.com/:x:/g/personal/mlboteoe_sat_gob_gt/EeizMxdSrtBGqA64_SS5WfYBB90o-tH0FzF6juHIwWN_Kg?e=h6ADNa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295471579269079" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4912 2196 chrome.exe 82 PID 2196 wrote to memory of 4912 2196 chrome.exe 82 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 560 2196 chrome.exe 83 PID 2196 wrote to memory of 2652 2196 chrome.exe 84 PID 2196 wrote to memory of 2652 2196 chrome.exe 84 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85 PID 2196 wrote to memory of 1360 2196 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://satgt-my.sharepoint.com/:x:/g/personal/mlboteoe_sat_gob_gt/EeizMxdSrtBGqA64_SS5WfYBB90o-tH0FzF6juHIwWN_Kg?e=h6ADNa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa85809758,0x7ffa85809768,0x7ffa858097782⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:22⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4944 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3408 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4928 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4556 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5032 --field-trial-handle=1820,i,10014030375022416710,9941907991646768273,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5583a8123e4d760ec98fe0abc66f61270
SHA113dc0fd7fdab96cd07d0ded487bef57067c10598
SHA256f9c0345dbe544a31df2cc08f814ad02983b7421622cb5be5669fa86cd5f94fad
SHA512601ec681bd36baca49ae491279cef41cbc4a08f92dff09af10289dc910e0ba52d23dbefaf902e1fe2cec4e36d9c8a647eaff26b429a920e5a806acff4174f437
-
Filesize
864B
MD5777023155ded1b0209dfe600a7766af5
SHA1a3b3e27ea3c7a26a293ba38685a8f0d8a666c4b1
SHA256b82046ff32d8571dc0f34d558b47288f875ad84747f06ab480bb0315f900476f
SHA51245026ef2130399d0ed925717854fd4cec5361ed629b41225400aac193a151748672f40aaa56093fcc5de918c5e9d53c32a0dc3fce971c851563fff5835ded86e
-
Filesize
6KB
MD5c399c136e94f2745a9e572aae0b7b50e
SHA1cc5970256aa08106abe794acb4a86ee98bb4b60b
SHA2568bff7ac48db7c8a44f54eaeb052d3bce482b77dc4f6261ff533c43f585e53357
SHA512aa52414d0955724151a1e466f2c9a0085e6db02cc6aa20aa01919f6077d93bde9b69ea0bbf8b6623345745f85e80b1d8983b4e8ac6ea9bed1891824c10fa4eee
-
Filesize
15KB
MD5dc2aa5af8fe3f7819b0e6e3bb27f2d34
SHA1e7f43879e1176b4b5ed6b27e541bda7b5d6975cb
SHA256334a60f1d8f192b4cd03fd425ca3e1fb489911e300cdf236fd72fafb707458c5
SHA5129076f55b82294eae2787c27ba91112a712d641d0bdedcb3de3df222f0e60a08cf8f433b45b051995bf508af2095427d6191a355bce63aaaeb2f2b106aabe3cd0
-
Filesize
153KB
MD5059184c7ffdeac56ed0e479352306908
SHA1ff9adfa35c6caa6dd1ce85fff778924d7c23e858
SHA2563fa01eed8d816ebbfe440422b2e11b182a6995a35d3e0cf3c64ede8f7ebc9d13
SHA5126b94e19581f7b717df1333929f956eb606f611b62b21263f3e71ec804e997c0eb446492af3b5640ab85115b35ae4e24c7ff7143917b48a189cf946e89c35cd5f
-
Filesize
153KB
MD5975b983aff2ed43d7940396a24dc7d1c
SHA1baba6e6b6d13fedcbd3193e14d894b7a14fe1f8c
SHA256c650aa3f87df4c0109c10e4348f0fe6c9b44df7f45ba7c9933652e9a82f85461
SHA5125cf18edad0f724c712e25848ad5f661dfd2d4646ab7f13193dd2b9e761257989bddd2fd29d806d807627382599c7e23858e4f89762cdbe0176ee4b2074745b0d
-
Filesize
153KB
MD586d154ecb3559b51140b7eb9a30c0d2f
SHA12362961b1564406820f8e73f0869a1e1a9101138
SHA2565b8a1392ef1fdecaf79b50275fa28977c6f743d31e102f77cd93b20d4de4f4b2
SHA51271e784154602572e622eefbcd02af829e8aa56b2c83563d9cb9673b02963bb7d6184cbba1c7b23ad7b03c5083db568f161cc30fcc667486153659dab9b97fae6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84