Analysis
-
max time kernel
161s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
18/09/2023, 13:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://net.is-i.site/WlZINK.ES/app/si.php?491K0078H028S14E219&contextType=external&challenge=?8b8f344a
Resource
win10v2004-20230915-es
General
-
Target
https://net.is-i.site/WlZINK.ES/app/si.php?491K0078H028S14E219&contextType=external&challenge=?8b8f344a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395181998102273" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3532 4508 chrome.exe 81 PID 4508 wrote to memory of 3532 4508 chrome.exe 81 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 364 4508 chrome.exe 83 PID 4508 wrote to memory of 5036 4508 chrome.exe 84 PID 4508 wrote to memory of 5036 4508 chrome.exe 84 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85 PID 4508 wrote to memory of 3772 4508 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://net.is-i.site/WlZINK.ES/app/si.php?491K0078H028S14E219&contextType=external&challenge=?8b8f344a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdea9d9758,0x7ffdea9d9768,0x7ffdea9d97782⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:22⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3716 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3244 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1768 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2260 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1824 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4664 --field-trial-handle=1892,i,17234052179603782927,5605134264539470320,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5527a5a825e03d662d3a109029a878a30
SHA1f4ac8079ea75ea0b9da88ce8af3ba131500342fb
SHA2560a6dba0fa3688d9b918394e59a86dba655330924f68f2428206a8dc91090702c
SHA512181ecb47dfef1689f639fd8380bdb9d33854067bff347d9b8c4e2e8c5c8b43c29b4e4063ac67569e5a13a8b6e9b34a1cfd5321100c94a47db2d451373b978779
-
Filesize
6KB
MD52bcf7942086aa09d91f0c4e6db0cebbb
SHA1bbf67b24e4fb4f65733fd961cb822ec261bcfad2
SHA256663865d0fe6ad6d463975712ed451d2f8ed29e8a34bbcd2627c48af6ddc2f274
SHA51212c43f6ebeb3a88031b2ea3f62461602291281bda04abc63c038c0cec4d489ea7e8d247f7b6870f1ddcce2b94a7503834339ad4efcd1ee7bce08df838c0db73c
-
Filesize
6KB
MD56443b76ff36ed80a89c2c69671a19232
SHA1b8025404149cf3990bf16eeaefb68651de4475cd
SHA256f2ec6155c9669dc3bec4f4282f9656bcc7e6f355bb3d49e37cb4a5bdb16da0a5
SHA51270b2b57347ac5c486412834cffd051841428ac45bccb36a1e42ff48d0940d15c555a3600cdb09693faf712266d9998d4a8a782062c63e100690e641e0ef4289c
-
Filesize
102KB
MD5f3b14168b825ab4fd31e836c32e891fd
SHA123528ff7a77173bbfe31db027dd837e6df377bf2
SHA256b13e0b96288aa8d9fd2693d043a9d98ae03a8f3c24880941e31549d7835f11cb
SHA5123828d829ca5cf6c5bbbea052fa0f0b02c69835b90b0b92a728eeef0882d9f18748669aa3258891dcccc563ac9d9d55165ec204cdd5e5d6a2df31a7777e211cbc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd