Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 22:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tdacomunicacao.com.br/
Resource
win10v2004-20230703-en
General
-
Target
https://tdacomunicacao.com.br/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133376489357102326" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1264 3892 chrome.exe 82 PID 3892 wrote to memory of 1264 3892 chrome.exe 82 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 656 3892 chrome.exe 84 PID 3892 wrote to memory of 2940 3892 chrome.exe 85 PID 3892 wrote to memory of 2940 3892 chrome.exe 85 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86 PID 3892 wrote to memory of 2764 3892 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tdacomunicacao.com.br/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4bed9758,0x7ffe4bed9768,0x7ffe4bed97782⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:22⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4820 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3236 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3076 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1776 --field-trial-handle=1916,i,810873108308992290,12496884418953297827,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4528
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58b0c30b6d1b757ab1abd0ac2512f3763
SHA14951ea827b6a96dbbf067e2f33c761d0ff98a09a
SHA25668c0f60c1058034783fb58153035771675ce0f5db731b8e073a5ee865d8fa34c
SHA512d3aef5810a3fc985d1fe5cb2bd5c52c950a10b9ce00fa07c24000f10273f6f9869bb99399ce438d9e0105c77ae2ca9bb51303857d0c6f4485e3db5b3e4f5eda0
-
Filesize
2KB
MD5a9239e1da2caa824a90753288da550b0
SHA15aa3ab594efc7e9b66a5464daf54503b6c17ed8e
SHA256b9bab4537bcec926619fb705e509e62cf7e071def57e2483caa52dc8e7283aa8
SHA5121eb4fdc8484c55a11fe0a5214072baf8c0d6e1deb438c52e56e12ba5224d69fd2f4d43aeea7ccf12dc87f548de25d12d4add334a179dec62fd5c02dad8268573
-
Filesize
1KB
MD55a46532637e407d51aeb34f3f35deada
SHA1c24c0fd99ecc6af404685c9343d54026315ddc38
SHA2566fef6c4b828d720fa0511d62566046f12b0e4d7aba28499d67118dd8607bd421
SHA51292a58fa0381169b32bd79f4362f47919d69571f9c245ea9459bb4ac9b6d979718c64ba085a61af5add815126c2186a04b407fd24fbee93216edb25f91177e841
-
Filesize
1KB
MD51123db9ab56dcbf416ca31bcfc09daa6
SHA1aed50070233367a4bf6f929d86590f78efd5c242
SHA256c17a0514bb1ead7d8a5dac349330ae03a92135acb317b76fcb27541890549bae
SHA512b73147d5bc30d5c31bd30509510b6f7144c55b80f2ec82d37ed94552dc9a2558d639c2e3833c81ce45bd1cce2877fbbf80f7adbffbed86e11c7f532d6183d19b
-
Filesize
6KB
MD5b0db2e206810e6d0243c5a1522191906
SHA1cec9d028bdc5a8899d79f1cad29534331b004f01
SHA256e3d428327854fbb29015559e8b1cb58c508b94cdd2c1abcfbce404123806b2c8
SHA512a6b2b046414d57ee5f276e6f65121726e0f76690791888bde94e7085f2ae466fc5f190fcf11470319bfe8ecbb88cb1c6e28d5376bb488d3438a66e630bb4c83d
-
Filesize
6KB
MD5340ce16230003bb921f0e3e78a4d56c4
SHA11f83af07ff5b23ba1cf46785ddb3747a389d2c7c
SHA25695d08065d7f113f76cb02b29b08c4c6686ee7ce0728b7e84ddcb2de2c59cbb80
SHA512bbf064a5526e471862cb6d0ea58e6eec988cc3650988d75465a82c045cc406aeac014bdba56065876763614929a48fb2a9662a3210cc49209bcdf3408b207678
-
Filesize
130KB
MD5d22e64b0e399e06b1727eb4da5e0f4d9
SHA1c1a238358c3cb5c979b7355e1deceda324d5c59e
SHA2561e2f7f6eda2e4a6e4d9fdf79a1b1676a78af6244a01bcc1ef1bdc4170e2f30f6
SHA5123910b5daef1da6a242f5de661fb5cb1f88f0a84726022442941d3686a26f79f90e22c1444de4a9a0b37d59794a2d2cbfd447cbe0b4cc7ebbcf1010760defa371
-
Filesize
89KB
MD51fd85ea4ed8103c755af632bf2b167bf
SHA1a198abcd3037d8312495eabefd9f629a67a0761a
SHA256b5da26d9749bace5a50e0fb112eaa429d9966a1c6abbaf5e632d5b8e5071e284
SHA5125296625acfd9092af6b2d394cfea4341df0193f90dcb1ee63969833b108090f88cd81533eab5c1ada00cbff10c63582f34978f16af50f0d5a657d7e018613827
-
Filesize
89KB
MD5e052961f0729fd9402ed9edef7490e4f
SHA10ce31b08c5b98472e4fa4934bc60559de8c3373e
SHA2560e4abf1c45630b9f45fb12d81406981ea312fc4def3fe4cc08defdc8a4ffc747
SHA51220e3feb777959dce5b2ad805584bd23b127016028abb201d8d78c0f049bbdb193f4f3de1143df446f9b39c2f0b20d3c30c8dfcda34de0bb6705c337da2828525
-
Filesize
89KB
MD5955f5e8df0f305b1701474c0927599f8
SHA13a637b92f565f550283eb3edfde5e0c4d640c5b9
SHA256ddd954cb66c7f3f56cb56a068f1bbc57e854cdc6fbf5b9fbe9088240ee15ecc2
SHA512062a2eddc6931147bcb5af7206c8488963311a36a8ed077415774699bd772574ad3fd264e2d7c4349f072c825d1e1ee76ef07fb44320be7b241eca78c9c57a15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd