Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
09/10/2023, 11:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://inloggenklant-internationacardservices-apparaatbeheer.codeanyapp.com/PT/
Resource
win10v2004-20230915-es
General
-
Target
https://inloggenklant-internationacardservices-apparaatbeheer.codeanyapp.com/PT/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413258735109117" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 1100 chrome.exe 1100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4632 2104 chrome.exe 83 PID 2104 wrote to memory of 4632 2104 chrome.exe 83 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 452 2104 chrome.exe 85 PID 2104 wrote to memory of 3172 2104 chrome.exe 86 PID 2104 wrote to memory of 3172 2104 chrome.exe 86 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87 PID 2104 wrote to memory of 5080 2104 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://inloggenklant-internationacardservices-apparaatbeheer.codeanyapp.com/PT/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff890479758,0x7ff890479768,0x7ff8904797782⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:22⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3888 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3272 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5316 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2416 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4900 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5480 --field-trial-handle=1896,i,6218440246478976557,1311622867365916444,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3012
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD559b4e41d7d2c63583c66753d18808bea
SHA15cf0b7ddcd1d6182655ff97b71c534f705e25706
SHA256d80389680cba624e9526fde1de0024ab15b25c9a4b30c5dc90fe3e2e788a400a
SHA5126b977c8838ab6a7810d45c4c7911165fdaff4a764947f1a9aa6f29b77f94bdfa11cb47896d66b08617ee85c27a4ccc534a3b8a152265656325d1b7a30d1b421a
-
Filesize
6KB
MD523865cfedf4c85e88a2f816ff8b8fcfc
SHA18d8ed7699361d310330d36fde34d3eac7ffcdf68
SHA256260cd4781ed4f4fb109348631e0945df46ad4a324d6909649528f2939e3a55a3
SHA5124a685c5a041f407fc95a512bb31c3db6c07f6d7dfec17724eeea006b543e3ccd937520b80ef1048f3090115d4e78e46e7e39796d8c341074d148c0674171a9b6
-
Filesize
6KB
MD57de99d21478a3a9b98ca51ac64c62ab1
SHA128eecc9d6237eea15d596d7feac136562fec7093
SHA256a9fe391a466a04ff43310b9ae9af92b5cc856d0f40bf2067e401ca6d81f3312b
SHA512deccf7ac15bf5f88ead7cdf5b9fe46749eb97b4f4c7db6b6f0626700f968617f335c795ad8ba49403c2dea7a5b2f80c977587037a9bc7e681f44ae8362417851
-
Filesize
101KB
MD594d5016773687f2aef70da7cc6ade76d
SHA162e88dc6962e8db80b28d585c1c19a22d19aa403
SHA25636e500d6412ccaaaa0139bcde5a9afd45cc3a481942dd222ddab52fe320afcd6
SHA512d9aa40cb585182eb3c29b718bc2b0900acaf60cdb84f733255e0f52e81a4242975606ef42b271d863b619f46c023da5fccbb10d0ca8df36dea116e824d41dae3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd