Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
26-05-2023 14:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://formacion.contraloria.gob.gt/mod/chat/view.php?id=11592
Resource
win10v2004-20230220-es
General
-
Target
https://formacion.contraloria.gob.gt/mod/chat/view.php?id=11592
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295932656968613" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 792 chrome.exe 792 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 1456 792 chrome.exe 82 PID 792 wrote to memory of 1456 792 chrome.exe 82 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 1536 792 chrome.exe 84 PID 792 wrote to memory of 4832 792 chrome.exe 85 PID 792 wrote to memory of 4832 792 chrome.exe 85 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86 PID 792 wrote to memory of 2956 792 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://formacion.contraloria.gob.gt/mod/chat/view.php?id=115921⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a3ff9758,0x7ff8a3ff9768,0x7ff8a3ff97782⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:22⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:12⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5212 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5044 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5000 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 --field-trial-handle=1836,i,14064962023733240490,7541748313921043396,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5ae19ceae6d72cc8a3652a64728af5f97
SHA1bd0f54a222b4f1619d175c45a9db6d72f0e79a61
SHA2569f0a9d2c5b1b8698f811dba5198ba7b087408a320dd376b7bf5ef63b6332f8b3
SHA5123f616d73e501aa6eda8a72dc7975a957fed03335eb564f8c785b5192ee39a89b778a80b98c993117d93ff8e9c59394b67e1effca8d14c74a5a20ea5e6157a815
-
Filesize
1KB
MD594afd75b713836e33a65e6b0b43978da
SHA178632a3baa99e02365ef7850f3e3141ed09d71b0
SHA256626582a15ce5416deb04d1677077572029843322e462d5edb1d806a37ad070c6
SHA5125948e951bd55bf2b8eb550f323f03fc0e7fccb2ad8295c3f6107a7d1b59ae8c97de1837b127b9551c0e511446780d807d67b0fd760171d7852d7fdbd24bc149d
-
Filesize
539B
MD5e9afe3d09643d0703e7d1c656c7ed7e4
SHA1dcd3b2ce67eb37028e734887bc44ef66e5828a96
SHA2569b1293fcb1ee34d3da0f742d30e7fcf7c3c4ea3b9ce21c95960668e406048448
SHA5122dadb9702cd2bdaf8351b5b170f96ecae4a14502ba7fe532f7566b54395752571194ea061367ddadf6188a658488aacd1bff30f77940700ae723a777dcd02b5f
-
Filesize
6KB
MD5153818bf4d16df51761ebaf50a114e72
SHA1cd2c5dcb07467f5be96281f27c4db88deb62aa19
SHA2566f896717a5ca514571dbd323b02edc6f055febb6ac17f968997ceeff4f149b54
SHA512ab1d3f2d4748ad9675e0982c9ba9630579611e9e8436bc3e9dc1c6a0747073e1550c662e189493c2def38c2aee32d923f4b29185e8507003ba84c8d3631177bc
-
Filesize
15KB
MD5845ae5308b79b16727f4a51ea275299f
SHA11e06cfa40939ca7605b35d0accb2fa6f55ba980a
SHA2564a44e278958cd076eb4388c2eb9dd676a0066db34a9b936e094ff6dc3a3127bf
SHA512740e46cc5793bac1db819b7384791f28c1a54eda0a25834e606d3245ec60fd503bafd155937020d95bac950b9e8157c038e3ad93f7a1cfa008ec3613533a6098
-
Filesize
153KB
MD5806b627407545f4397d00ac3d9f8eaf9
SHA14b2187dc3d3f2d302542f9aac6b8db60489d5b8c
SHA2568fdbd934377f887dc9cedf800b586002203cefafdfb0374589ade1cf62b1da0f
SHA512c9bd236c37b5dff4103b1065e8578b64dd90d8b7bcfb13c936d65fa4383b03f69ed96282eaade55aa5207c7c5587b143c86e0125159cabe9bd9c12c098b4f7b8
-
Filesize
153KB
MD574b71646cb331d6d29fa69fa32ff9ff3
SHA1c9f8414c8eab98b784ea1174d2a54d43106b8438
SHA2566449bdab4b7e760e2400333e637dc80ad91a2d4802e004532100b7d2c3efb6ba
SHA51207335b87c86fb832f79a3bc5c5a7071c69ec6ceacd56de82e8d86e4abb784a31b46f4bae76fc7037117e2f0bcbe9cca94c58d251e05d943fa30885e162b5bdbe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd