Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 02:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://nslmti17w3ej.iconcuts.com/i/cC9jz%25Wek0g4nGo9nVyCLaLbzjLkpTzSBUd1Gjt6EmudE7q3LA2LabaL4D23Vg3KlrAUrx3Wp3pxVHGLpP0ny7xVAySz2pl9IKugTDIeiAwn07MURI9FHLcUBpXHmYZnaHD4Ngo62qPWSOKC0v38Jbe0MPX%25vPlksDJi0Sg3LlfWCGlvyBthASaFuVXuMWyfos?url=caricati.adv.br/auth/fsgsg/ZnJlZGVyaWMubXVsbGVyQGRhbmZvc3MuY2g=
Resource
win10v2004-20230703-en
General
-
Target
https://nslmti17w3ej.iconcuts.com/i/cC9jz%25Wek0g4nGo9nVyCLaLbzjLkpTzSBUd1Gjt6EmudE7q3LA2LabaL4D23Vg3KlrAUrx3Wp3pxVHGLpP0ny7xVAySz2pl9IKugTDIeiAwn07MURI9FHLcUBpXHmYZnaHD4Ngo62qPWSOKC0v38Jbe0MPX%25vPlksDJi0Sg3LlfWCGlvyBthASaFuVXuMWyfos?url=caricati.adv.br/auth/fsgsg/ZnJlZGVyaWMubXVsbGVyQGRhbmZvc3MuY2g=
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.ipify.org 24 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337747466536008" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 376 chrome.exe 376 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 376 wrote to memory of 2184 376 chrome.exe 49 PID 376 wrote to memory of 2184 376 chrome.exe 49 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4688 376 chrome.exe 87 PID 376 wrote to memory of 4692 376 chrome.exe 86 PID 376 wrote to memory of 4692 376 chrome.exe 86 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88 PID 376 wrote to memory of 2656 376 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://nslmti17w3ej.iconcuts.com/i/cC9jz%25Wek0g4nGo9nVyCLaLbzjLkpTzSBUd1Gjt6EmudE7q3LA2LabaL4D23Vg3KlrAUrx3Wp3pxVHGLpP0ny7xVAySz2pl9IKugTDIeiAwn07MURI9FHLcUBpXHmYZnaHD4Ngo62qPWSOKC0v38Jbe0MPX%25vPlksDJi0Sg3LlfWCGlvyBthASaFuVXuMWyfos?url=caricati.adv.br/auth/fsgsg/ZnJlZGVyaWMubXVsbGVyQGRhbmZvc3MuY2g=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9a1e9758,0x7ffe9a1e9768,0x7ffe9a1e97782⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:22⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4752 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4952 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 --field-trial-handle=1876,i,14417734248582063388,4822829857144439667,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\564ab00f-1360-4ac8-9037-ef3f76c70b7d.tmp
Filesize6KB
MD5763a226222dab2a37ba087e319558c0d
SHA12a67ddf80e3687c8a7480129febcae97d687f309
SHA25615a8eabd53436418f0b7cfe5330cb6115c10a64c34652055d06ddd4380136c68
SHA512a39f4bcc0e2db655700ae7b3f5311f48dfa3cec559ff07ab6eaa286b3f6ee55cd57ff16ff3eb3598b11ddad00d43d1d1c0237ef7be46b9dd0311091eb088ceb9
-
Filesize
1KB
MD5e40e1b96d1795f748ea0b4fb594f418b
SHA1d10f760b325530ed2d50ee5a1158f439ce1e1d6d
SHA2569a1d2b966b3870f591ab6e32b7f6588dc8164434dc0dcb9d6d22d4c1df5f4d01
SHA5127366b54ef12ae4a679844e653ed7c5e7f0fefbd4ed092030fe9880ad47628aef0e2ea6debf62b38fca895f1db70c2f77092c860b792c944d6c0889764234993a
-
Filesize
539B
MD5e49e2031beb5f9243f27d2bffefd1c75
SHA19c2088978d42ec3cd1bd1355c0df56bfa8a5bc98
SHA256e3f654e40bd4ff7ff0555ac9a3eb33da8fec41f7f9d61114bf91d08047a058cf
SHA512355e99a32618ebb34dbb6cf595704bd404cb90341e31160af87392479c5e3bf5125d60d2712219f7fdd0b8ae55743f3d9bb69d940ba4026f89f4bbe2258a0602
-
Filesize
5KB
MD599bd83407bbb628255510b43743ff2b0
SHA1627011ded0bad34eab8502364043d6bfded12e68
SHA2567394f86d756be3481d821621a9092fecd6916263fde5be1f81631e3766f647d5
SHA512dc67e6a56f4a087f3052944d1137c9883ff64103d0da551d714b9c7de5b27b37a25ce98dddb283f1fdddcd614e561feef16966cdace476f691f903cae564256c
-
Filesize
5KB
MD57dfaf5e32dbb7b080d611f46decc2ccc
SHA110c69a5edafcc6c31644ff5df7e413140c113f88
SHA256b1823911fefb68a62beee1968741ebdd180194b06380274cbc910160712e4f17
SHA512e6b0ab45884b322492d704fc8acfdfd8c17b298886178090bb3538a25c4af50b050eccac3ff451c269b7cd3864b7fe97186f4c84356161b6ff7a3f596f5e35be
-
Filesize
87KB
MD57ac24a3bfc523b9d75cdaf47c5277190
SHA1db86995b18d376cd4852e6283947ce9514d0f70c
SHA256bd3c30ea0e1eeda05e71e02cd48f4e662372a1484591da44e47d7e6d25293e00
SHA51290780964877066ecafea4fbf3d836ffd00e6b17402a333821d331d3ec4a859bfe3b5f6632ac5b275d681cf10b231f93a1deebd52ce0f599f7134a31ef7dd0d47
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd