Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 00:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r.srvtrck.com/v1/redirect?yk_tag=337_47d_c3_3b6f&site_id=56e7d51be4b05d750682348a&api_key=abbc5236946676eae219a734c0a1c5e8&url=https://riocomunicaciones.cl/new/auth/[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://r.srvtrck.com/v1/redirect?yk_tag=337_47d_c3_3b6f&site_id=56e7d51be4b05d750682348a&api_key=abbc5236946676eae219a734c0a1c5e8&url=https://riocomunicaciones.cl/new/auth/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133333356351150627" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4064 3924 chrome.exe 64 PID 3924 wrote to memory of 4064 3924 chrome.exe 64 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 492 3924 chrome.exe 86 PID 3924 wrote to memory of 2296 3924 chrome.exe 87 PID 3924 wrote to memory of 2296 3924 chrome.exe 87 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88 PID 3924 wrote to memory of 4492 3924 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://r.srvtrck.com/v1/redirect?yk_tag=337_47d_c3_3b6f&site_id=56e7d51be4b05d750682348a&api_key=abbc5236946676eae219a734c0a1c5e8&url=https://riocomunicaciones.cl/new/auth/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff265f9758,0x7fff265f9768,0x7fff265f97782⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:22⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2808 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2800 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4760 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3416 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5364 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1880,i,16608240950932654335,16954144888331228552,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD51f82d95fa1fb0d0ca5c2093eadd1bf0c
SHA1654581dea956028e9631c57d8f04bf1469896692
SHA256398621c93d85e71ef80878c273984884356b9e800b4482c941eff18111cc91b7
SHA5122843140421d6dfe6dcdd545dcb428dd311efcec5589f09232d30058259e8e5a04fcd111f15376e87c3a969e23f3fee5eadc8005530b1e0e4b4249f623c4c4231
-
Filesize
705B
MD57e9a841a821139ea03ffe15d18918ad0
SHA1c870e8ac788f62bb679b6596a5300b9f1be3e3bf
SHA256eee362f5988bfc33f0d548bb38d562998a6894b19678fe9f20b0db2d8dc359be
SHA5125bc3a61bd56d983aee4c12773ce33e8eaabd5e11d42b6c41821fb2643368f885a7733e97ec23a7cbaa28ef529bb2d1b08d3d214f466c35bd0da1a51c8b3fe823
-
Filesize
6KB
MD5001e6d09e5d2d714ad8bc69fae6c9a2d
SHA19c4bf8eb71692b2e8c6f9f8c7d224de56f7b43e7
SHA2565bdea285706da8572eece01399ee4d9b5d39506c2c5c63c89a1b6e5622df49bb
SHA51242ba3d57df08cd27ebb171fa8bb604551f3c032b9b7157aaecf1a85d729f79da3e49fc80160b3c00109836eaf8dbe3a0eed256ffd2849c2da0874a862724ded7
-
Filesize
6KB
MD5916b1069d5a9107bbedf1e54e6306d97
SHA1cf893e9868c5806c6a06e234b138f77d1ad99558
SHA256beb3569449b736f2b99a2a77dc14c9673c598eb7767fe0724479c2df0f121044
SHA5123219d70e333e660cf20e7fd651d8fe409c554473fc2e7142f0ee1cb383576335ee6b84711e7496374c3b3ba4445b4858c4880d1da956084bd57bca0463acc26b
-
Filesize
15KB
MD5f96ddf933dbfc96c79cd1607f140c87d
SHA1bdb67fa174c43d6d0f26e73e6c218135697afa41
SHA25667b997e8276d05d92b80475e837fa5e8502b2256b1868ecf7e74180ba1a2b03e
SHA512c69c20abd703cbf00fc03a9d037354ca390b8a3b81d6ad46a804dfbef9a44a3025f673920dec7270e7efbd314f5fd279024f157517eea778dc9cfce7c723ce5b
-
Filesize
172KB
MD5207b4f598211e6ece50406c83207b752
SHA1d9e0f1c4b0f571bb9db436dde315b8d3703faf4c
SHA25660232e91f0105e948280558e7bd53af1a560d5278c374a78f230a790117adba1
SHA5129df8f894eda81fa733a1179ddcc4648715af44c569e6ec7f0b728c3fa99125ac10ed51e67e6f64c7965eefe26d8a362d72645164a590a971bdca4ace345b4553
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd