Analysis
-
max time kernel
410s -
max time network
426s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
Catalogo.pdf.html
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Catalogo.pdf.html
Resource
win10v2004-20230621-en
General
-
Target
Catalogo.pdf.html
-
Size
2KB
-
MD5
24c3acfe035a0322b96c3157f3bdff5c
-
SHA1
a8942661e762ee136b9e6e27aa6300bf1123783c
-
SHA256
ee1e980d7c55cae79f725bff6a0946c69f910f6a54d448d7b8867bcb7eea0ca4
-
SHA512
a1caa8b256af3d99abe972c5dd461a3711977a495b4e0ef4fdbf35b230c8fc8c7f41dc2262b445255b4e4747bdabd1e5340df43bbd30b5cc69e227d93d8a465d
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 1748 840 chrome.exe 28 PID 840 wrote to memory of 1748 840 chrome.exe 28 PID 840 wrote to memory of 1748 840 chrome.exe 28 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1628 840 chrome.exe 30 PID 840 wrote to memory of 1096 840 chrome.exe 31 PID 840 wrote to memory of 1096 840 chrome.exe 31 PID 840 wrote to memory of 1096 840 chrome.exe 31 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32 PID 840 wrote to memory of 1716 840 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Catalogo.pdf.html1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67e9758,0x7fef67e9768,0x7fef67e97782⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1248 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:22⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1588 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1700 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:12⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1560 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:22⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=1372,i,12769632284307406914,2369699725007883784,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e5a1b0f5d89845c1c8cc7f35f14c46b9
SHA1cc1cc57b92983287cbe8f64a5fe7043e27deeb5e
SHA2567810c0ba3d7d823bc7a2a5cfb772fb1ed013dadc3951933f5096e73a2ef71c23
SHA5122465d0c3a3ecda4e89a71106c852b10a1b91d5866b8d95ba3dcf670ff1655e41d04e83d55c5c751cc610f786609535843863b22402f388b48db4f919f346e601
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\359e5fcc-b03e-4159-a781-c18bb5a74532.tmp
Filesize4KB
MD54914b795cdc4857cbd9349040674db6c
SHA1a44cae86222555583b052f93ecf53824111cae28
SHA256175818c278ef0ae49478d8d24b73ccd2eddc867037a5a36273b916673dedc2bd
SHA512c29a1e622a0f96fc1012e9379f810f3273be2537f2c2cbdfd8d193598a740cc595eaa3728404fc046961e6866fbd7670fab48d1a0df1fd1f7904e0aa2443046d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6dbc00.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5050e36551db8a767d0d16afdf1422aa5
SHA1334c45efd6fc8b841930ba2b9aa941fc23fc74af
SHA2566ba8b1c68d00070ab7b6c0b8816371f9308c340082a14ff594d37eec087e2e27
SHA51210dc7d1af7274bc917ebeed89858b6fd2508b12162c1695e588ca90d6e92b6ae879a7bc79f81e46d01d5906623c728b2e5b0f8dc53b2ec7e638bdc52d7548848
-
Filesize
4KB
MD5e3ded90a65f8bbbffa72cc841375bc75
SHA171a451d083aaf5f62482a3994d6071242a54c362
SHA256672a3b57d83b036287582ac836494969b6fc8323b1719b02b864aaecf6512cc3
SHA512e859eff1a4a54fb63c42f84e74496745cc05a53e4e52b1bf77de5a3deff7ad452da459b01961e447cb9360c3f5fda821e8649d0db7f6f5c332087dcd0a30cb0f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
176KB
MD57d6313e377c2cf98aa76b792a84bf7bd
SHA1c925ba64a16c87df56c8048bd751af08e93499e7
SHA2565d0f442e8ba732072cb9fb84846754f1873a54dc8d43a1ea019eab6c469d2402
SHA51206ee8b410a5af108703a85d64467deed2b5a46e0cd30dc2c8ff6a81bfa1c01ee07c01d7da637db54b15ad5da9907d71496cc6d13e2ff45206608b1337b31dcf3
-
Filesize
175KB
MD55e927adec8f65e5332524c5df5869e30
SHA11e43baf861535ea371ea4a946dd961441d1e008d
SHA2561d15be6ffb654aa74080008cdf121a82daf1b8d42e9974d2c7a8d6a04623db92
SHA5124b72f979630c44549f0441b1857067e2b9e11ecd090dec7de348b68826c3285abf874d5a0e0ad25c4919b5f06f59b8f74159ad7200b99ad94cf2f734d0c10d8c
-
Filesize
89KB
MD5fb3de9eb35236abb776972e3e9e205ef
SHA15a64f2d9fea15e7c875d5d944656d809a7bc0b0a
SHA256f4847d833a266228f93b72fc5f78874728772e285e1a9f9b913ab378e9d8255f
SHA512dc612c5b7cccdcd7677d84fe0efbf972f3755e1bf81badecca131b9c6a858d4c7012fc6ca90a81f61c5d3dc84cebcfd7885c9b448904a45bb68a6ffdf315ba9d
-
Filesize
176KB
MD50985aa1abc9437721c2aeb2fde0c8fa4
SHA16f70c31e97a17090aef13d4e5058de2a6fcd8056
SHA2567fb19b9b271000edb93909d261232c5f8ceeb2858378749df4bc2f111f05358e
SHA512defb5e4241269a5290c8d359d27843d8b1f322a85b62c1cbe5829da3fd0df9573e4f4b31bb26bb1ef03ebd803d4dae8d32a2514e1185afc2efd574a137c23e73