Analysis
-
max time kernel
305s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21-09-2023 10:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://corporativogrupomexico.us14.list-manage.com/track/click?u=6cf90b2a28b61dd7a4abe01a6&id=2949346fd7&e=11871bd8cb
Resource
win10v2004-20230915-es
General
-
Target
https://corporativogrupomexico.us14.list-manage.com/track/click?u=6cf90b2a28b61dd7a4abe01a6&id=2949346fd7&e=11871bd8cb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397674014834919" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 2740 3292 chrome.exe 79 PID 3292 wrote to memory of 2740 3292 chrome.exe 79 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3720 3292 chrome.exe 86 PID 3292 wrote to memory of 3512 3292 chrome.exe 85 PID 3292 wrote to memory of 3512 3292 chrome.exe 85 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87 PID 3292 wrote to memory of 852 3292 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://corporativogrupomexico.us14.list-manage.com/track/click?u=6cf90b2a28b61dd7a4abe01a6&id=2949346fd7&e=11871bd8cb1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb674b9758,0x7ffb674b9768,0x7ffb674b97782⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:22⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2092 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3708 --field-trial-handle=1844,i,15366220019307758160,4330252098773014158,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD545e6a57578bb064a1e85f58f8b4f072f
SHA13ed4e82f27467b6df23536a9c45a766854dada70
SHA256d31bc3cf4c1df02e38b6fdab678d63d7fd0649d3a66e4c9ac3be4b8a9745594d
SHA5123514979998b381149c03d67e56044a8050a4efab1cae306978466c438f1101d244e5b54f1e5568f494fb5e7b80e54ff6efe3d3aee4c07ee790926ebd30bd2c10
-
Filesize
3KB
MD5cef87ab390bf175ee721c6441251b6f0
SHA1402c40e56fcc81eaebf49d5e1812762212a07da7
SHA25633f62a9b45d61baedec08ce90884b0457fc4d2f702dbbbf4fec724c94a2aaeef
SHA5125fbf8b510a1177b70061993a435640870844f30a14ad149af4d04a65c9e57370ce45000fdb97821f4cf892cdae45f436030fc70355b94041ea57fcb5232f619e
-
Filesize
1KB
MD5e2313798378dffe1d30071470acb5b95
SHA128ffee20545def5205c30f23817e1beb33f00cfc
SHA25664ea53fb0084c16034f25d806095fce8e813fd2697623a0b41bda2d2fea7ed55
SHA5127fb6537f81202caf6c31f244f24d996d58de5b58ae27d233c1dfc8ebd33916cd1f05b91e33a802785cc7e29043388088fc64dae9893bce71712bae051ca28ad4
-
Filesize
6KB
MD510ac52feb4e93e810ab8e793e1dd5884
SHA1e0a753014bcf7edc61cccf4bcf021423b4837922
SHA256cbf416d078e27b8d022df28e9f8cc9a3dd08699ede404f2e6bc3a2434e128db4
SHA512de9d1141bb995971b4006f6eeca42bc8120b800759787851ffc6035602e0b2aab9d96dcb54eaffe6284e6a14678f88d191c4fe90cfbf9e8dc693c4d364359fd3
-
Filesize
102KB
MD597be08f61951bc926973025033cd33fa
SHA1d991a6078fd7dba16e9fff2eb2f71873d63ca2c7
SHA2565dab394b3b8737b0704a58b06857d3d40bb1f92bd1102b2afae4bfa3007474ef
SHA5123f3dd04e7b7245d43b9d7028781ecc525da6e7279c7155f7ceed71815b69e755b8817a4f348c3cae6fd46fa2218f44ecbdcea4ea655186f87319ec4c4a03c676
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd