Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    06/10/2023, 12:25

General

  • Target

    https://net.sis-e.site/WIZlNK.ES/app/online.php?3092K0078H028S14E2119&contextType=external&challenge=3ad34925

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://net.sis-e.site/WIZlNK.ES/app/online.php?3092K0078H028S14E2119&contextType=external&challenge=3ad34925
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfa5d9758,0x7ffcfa5d9768,0x7ffcfa5d9778
      2⤵
        PID:3164
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:2
        2⤵
          PID:5088
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:8
          2⤵
            PID:4288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:8
            2⤵
              PID:60
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:1
              2⤵
                PID:2420
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:1
                2⤵
                  PID:4036
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:8
                  2⤵
                    PID:4384
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:8
                    2⤵
                      PID:1568
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2784
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:3244

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            504B

                            MD5

                            146c0473eaa0659cb4ca8eb7363b1ba9

                            SHA1

                            323576ec5dad6ae6d582b374c6c78c0542ef602a

                            SHA256

                            e5bad9c6537114458c76d55dc135838e09fdc89c80145ff5cd179d427aad936a

                            SHA512

                            631505d833e6ba3723a2386626c6b43bc2373560176e39d8e5072dead3b6225273a66442276698a9a55fb42a208fd1b664973fabfa9d89f60f47996f7c1b606a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            9ac3134fd8e2d7b67a297ef5755cc2cc

                            SHA1

                            9b88723564d6737e6227d906e2e2a75539a3f04c

                            SHA256

                            015bbe1cda1095e36f19599269ec84af6ab9de2cc6b0d1d213e13f5e72328b0c

                            SHA512

                            72069d528e03c51cfbd834578cdf3fdb5bc77dc92cab0896c90a3c2db1d5850d3fba8bd4039ac320fd00f69d961f8b25d650b9276352ff73c4542db919797d6d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            450558f5bf08949cdcaefe710696946b

                            SHA1

                            4ab1a31b2a191599902f2f1b75edb005be8d0eeb

                            SHA256

                            59a6dcc7890975a06eac5ec47ade56e21d5f8aa0dea9670759e407f07bb4667c

                            SHA512

                            b516c4f05cbeb7bf7a0ff4969e62aa37f48397cc1e145994a42ebdf8a1fcda269447683c7e29f6aa77288789cdf75d9cc2243da383e65f1a9504793e2e374846

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            538B

                            MD5

                            5263064d99c722d99020f6fb296d3d5d

                            SHA1

                            6ae479259cf63825de4a34691ae141e3e3837375

                            SHA256

                            e311367faf0ec2cdb8fd065a3d9c0524853a5387a701f5e58b1696a5344cc2d0

                            SHA512

                            cc4142305ac5d6afb06053e171c30340934820eb4e705362217a7b37632f00dadaa5e3577d93c617497b6adc3b1266d9223b788f814efb97e65829d0dc7bd0b8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            326cf87986a24bff48c24d6fb77f876d

                            SHA1

                            a43ef3a7456f043b6941f996b57061ad4e72f545

                            SHA256

                            56b048efd1be4e2fab2b8a7393a0849b969e6ca8bccdd29696ce39219050773e

                            SHA512

                            e0b6c8f2a5f6e57f67b245a672d0723825e62980acf6e9fd582db6950cfcef69d9cd6db58bd9f0d41c54e0f4ae864f63e13ac415e966fe9eed38b165b4a250ff

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            101KB

                            MD5

                            d47c98ffddcf715063ad7cf510349be2

                            SHA1

                            7c249b591381c2dfd705ced91d3c0d044f4cbf23

                            SHA256

                            29535944a44c3722a89a79a2f79915082c995bd83345e97f8b5a7681fa47d261

                            SHA512

                            07e2d28a5d277db68184c4bb55a9ce29fb8e6d6fc76d8dc2a1167ead5c4fa73f6f5833ef7771a9cb6966aca51a45a5435f7a3a7c953accab2792f29160704470

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd