Analysis
-
max time kernel
40s -
max time network
40s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/06/2023, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://login.lg.com.br/autenticacao/produtos/saaa/TrocaSenha2.aspx?c=propay_sodexo&auth=646E3579736A74634379717642624C4A6D5257464353512F71434369543349792F625A6A2B634E567A714B4D7A4D3774724E3870786C737A2F46705A434C6E31
Resource
win10-20230220-en
General
-
Target
https://login.lg.com.br/autenticacao/produtos/saaa/TrocaSenha2.aspx?c=propay_sodexo&auth=646E3579736A74634379717642624C4A6D5257464353512F71434369543349792F625A6A2B634E567A714B4D7A4D3774724E3870786C737A2F46705A434C6E31
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301867575620030" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 400 2044 chrome.exe 66 PID 2044 wrote to memory of 400 2044 chrome.exe 66 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4200 2044 chrome.exe 69 PID 2044 wrote to memory of 4220 2044 chrome.exe 68 PID 2044 wrote to memory of 4220 2044 chrome.exe 68 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70 PID 2044 wrote to memory of 4100 2044 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://login.lg.com.br/autenticacao/produtos/saaa/TrocaSenha2.aspx?c=propay_sodexo&auth=646E3579736A74634379717642624C4A6D5257464353512F71434369543349792F625A6A2B634E567A714B4D7A4D3774724E3870786C737A2F46705A434C6E311⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xb0,0xd8,0x7ff954c69758,0x7ff954c69768,0x7ff954c697782⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:22⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1784,i,507938554466474476,10961801695990599862,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD59e7b2ffdadf425ec8ad87745ee4c7e96
SHA157361f31cd3c52efff40d400817258975c93cea6
SHA256b2f5e08d2ad6516baf937ff00d21067a48fcd2a92b97042774c871dea03a8b46
SHA5123a077194f7f9f2d6579dfa74631ed6986d2ba2edac5355a8612530393fa3f9cdff14dffb647a61ab3a4cf2559554394205649b1b3901768ba691fc2ac1c48649
-
Filesize
538B
MD5658c640bb7cf9adc6883b4b45b9af226
SHA19a8b68d6d7aaeb4225819cda3e3d4b262de0f193
SHA256ba30a27d95bef2e52048631c6435992898f0840141736d4ad15a880d110ddfc2
SHA512d9049c1edd0d9d882967590e13ba0903e08ab9f1b3e6bc33c1999e2fd0ebc84c0045fa09e239649cb09e08e3d38afa0dccc078e62dd3c50df13f52b69da44591
-
Filesize
5KB
MD534b5e24c1d7b8aff28bde79dc2087ab3
SHA17c809ac21f638f6a5605433a55006082b699780e
SHA25688a53900dac7a781e7b0a0d59fc0ed19b2bf9c6c33c1c654514d4262543aeea3
SHA5121295e60f7bb5609fe077620b844057255e938c0af9180fde6bab0bb97abea263627bb5c96e5ad9482407edb1f5d96dcb3a5763366b7fc3f056238127f0106d38
-
Filesize
158KB
MD51a5a1e3ef337371dde3103e2abce2ed1
SHA1417960821f324223d6e1781dcadcf4c22d0da870
SHA2562b37aedef44812159161714b11779eb101bccf489c67e269e58b5ebdf49aead4
SHA5121618abaf57e14fc1a089625a973ef7be1adc49f6d375bb03a241a347f81ab9654807b414d3975ca13b03b50a4099540c27e18d9f9e347be65061e9ed9ea6b369
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd