Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
06/10/2023, 12:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://net.sis-e.site/WIZlNK.ES/app/online.php?3092K0078H028S14E2119&contextType=external&challenge=3ad34925
Resource
win10v2004-20230915-es
General
-
Target
https://net.sis-e.site/WIZlNK.ES/app/online.php?3092K0078H028S14E2119&contextType=external&challenge=3ad34925
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410687237778348" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 460 chrome.exe 460 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 460 chrome.exe 460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 460 wrote to memory of 3164 460 chrome.exe 58 PID 460 wrote to memory of 3164 460 chrome.exe 58 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 5088 460 chrome.exe 87 PID 460 wrote to memory of 4288 460 chrome.exe 88 PID 460 wrote to memory of 4288 460 chrome.exe 88 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89 PID 460 wrote to memory of 60 460 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://net.sis-e.site/WIZlNK.ES/app/online.php?3092K0078H028S14E2119&contextType=external&challenge=3ad349251⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfa5d9758,0x7ffcfa5d9768,0x7ffcfa5d97782⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:22⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:12⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:82⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 --field-trial-handle=1864,i,3010308069951788477,15072080660191707718,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5146c0473eaa0659cb4ca8eb7363b1ba9
SHA1323576ec5dad6ae6d582b374c6c78c0542ef602a
SHA256e5bad9c6537114458c76d55dc135838e09fdc89c80145ff5cd179d427aad936a
SHA512631505d833e6ba3723a2386626c6b43bc2373560176e39d8e5072dead3b6225273a66442276698a9a55fb42a208fd1b664973fabfa9d89f60f47996f7c1b606a
-
Filesize
1KB
MD59ac3134fd8e2d7b67a297ef5755cc2cc
SHA19b88723564d6737e6227d906e2e2a75539a3f04c
SHA256015bbe1cda1095e36f19599269ec84af6ab9de2cc6b0d1d213e13f5e72328b0c
SHA51272069d528e03c51cfbd834578cdf3fdb5bc77dc92cab0896c90a3c2db1d5850d3fba8bd4039ac320fd00f69d961f8b25d650b9276352ff73c4542db919797d6d
-
Filesize
1KB
MD5450558f5bf08949cdcaefe710696946b
SHA14ab1a31b2a191599902f2f1b75edb005be8d0eeb
SHA25659a6dcc7890975a06eac5ec47ade56e21d5f8aa0dea9670759e407f07bb4667c
SHA512b516c4f05cbeb7bf7a0ff4969e62aa37f48397cc1e145994a42ebdf8a1fcda269447683c7e29f6aa77288789cdf75d9cc2243da383e65f1a9504793e2e374846
-
Filesize
538B
MD55263064d99c722d99020f6fb296d3d5d
SHA16ae479259cf63825de4a34691ae141e3e3837375
SHA256e311367faf0ec2cdb8fd065a3d9c0524853a5387a701f5e58b1696a5344cc2d0
SHA512cc4142305ac5d6afb06053e171c30340934820eb4e705362217a7b37632f00dadaa5e3577d93c617497b6adc3b1266d9223b788f814efb97e65829d0dc7bd0b8
-
Filesize
6KB
MD5326cf87986a24bff48c24d6fb77f876d
SHA1a43ef3a7456f043b6941f996b57061ad4e72f545
SHA25656b048efd1be4e2fab2b8a7393a0849b969e6ca8bccdd29696ce39219050773e
SHA512e0b6c8f2a5f6e57f67b245a672d0723825e62980acf6e9fd582db6950cfcef69d9cd6db58bd9f0d41c54e0f4ae864f63e13ac415e966fe9eed38b165b4a250ff
-
Filesize
101KB
MD5d47c98ffddcf715063ad7cf510349be2
SHA17c249b591381c2dfd705ced91d3c0d044f4cbf23
SHA25629535944a44c3722a89a79a2f79915082c995bd83345e97f8b5a7681fa47d261
SHA51207e2d28a5d277db68184c4bb55a9ce29fb8e6d6fc76d8dc2a1167ead5c4fa73f6f5833ef7771a9cb6966aca51a45a5435f7a3a7c953accab2792f29160704470
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd