Analysis
-
max time kernel
176s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13/10/2023, 06:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://particulares-pagina-indice-pt-aushadi8768363686.codeanyapp.com/online/
Resource
win10v2004-20230915-es
General
-
Target
https://particulares-pagina-indice-pt-aushadi8768363686.codeanyapp.com/online/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416519977506534" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 3916 chrome.exe 3916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3804 2132 chrome.exe 51 PID 2132 wrote to memory of 3804 2132 chrome.exe 51 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 3232 2132 chrome.exe 86 PID 2132 wrote to memory of 696 2132 chrome.exe 87 PID 2132 wrote to memory of 696 2132 chrome.exe 87 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88 PID 2132 wrote to memory of 2776 2132 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://particulares-pagina-indice-pt-aushadi8768363686.codeanyapp.com/online/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddbd69758,0x7ffddbd69768,0x7ffddbd697782⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:22⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1896 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4648 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3128 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3160 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1828 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4800 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 --field-trial-handle=1928,i,15609408162352992496,10959864242912913140,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56f6f28ce5d224d8f1a789d0670bc3388
SHA1c5aed4acad1d092eb6ee9cc44aad6834091a8b22
SHA256b5f2abd03aaddec9d05fe3232ffd197826e9128b70da7e705d57c15cb51d7d43
SHA5128a3f48373219cb8e27d3575856fb3a318a658e083466bfd2c6561ef6ecbf5c7a3b9743fcb23fc6e908c81444f9c63fee0fc39fc62c173fbf4c0bf2135a67492c
-
Filesize
6KB
MD55c196c3f8902ce124eb081b70b4a712e
SHA1cdcabbd568c85a9632d560e9d0c9f09449052073
SHA2560f927cf8204033ae82f998c60d09c960b46449a1dc515e4de44ac4e984786986
SHA5124bc6684e24edfb4def02789c9aa7e6d6541c06e4a6f8480054d6c83e4d9ec9be7c6ec47419eec23869548c261d4afa175483b65025634820632361ffbc04718b
-
Filesize
6KB
MD524964c05fa679024bb7936fa32c77c51
SHA18db195b8543f8d827d18d9ebb95f3e83321adbc9
SHA256270357da8eb0fddd101695df8751bfee8eac13592e29ee401564a60ec23d044c
SHA512144b2223f079b2877696dff940ecb5ac7583e384c9ae9caa5d2ea9a5a2686a7e0a094edb762d5325142f10b6ab24bf8c7a8b2c9aab4b067833e181f296db5552
-
Filesize
101KB
MD5638b5c872c6d7d6fcd3cbbc7fc748b33
SHA196509c12b1ce41615d2047ac138317f7438c6cbf
SHA25661d31f77fa4f26c1a84215512b7c3611205c36972757fb14abbf5a27d66e63b6
SHA5125dda2794ed53aeb27e72187341a49dcf0c72c9230d1d5fb90a01560e3ebdb9b8b41a02ebd974cbc9f92818c4dcbe09956f8358e77b1928f0f04ae24fdbb5f535
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd