Analysis
-
max time kernel
1846s -
max time network
1750s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13-10-2023 18:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://abanrural13.web.app/password.html
Resource
win10v2004-20230915-es
General
-
Target
https://abanrural13.web.app/password.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416977941774858" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 4776 4020 chrome.exe 56 PID 4020 wrote to memory of 4776 4020 chrome.exe 56 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 3108 4020 chrome.exe 85 PID 4020 wrote to memory of 4528 4020 chrome.exe 86 PID 4020 wrote to memory of 4528 4020 chrome.exe 86 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87 PID 4020 wrote to memory of 4352 4020 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://abanrural13.web.app/password.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99fad9758,0x7ff99fad9768,0x7ff99fad97782⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:22⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:12⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1844,i,10533735048539991662,3321021860640162515,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d7ffb096c03755b49d05814d542cef3d
SHA100d8d4e84301347da479c191abea9f45771552d4
SHA256b91be0e9566ca306f3fbcf79732977aa6124a5e20c2587e4c3ab8449c80f5176
SHA512433c10e049b96743ca3621308f56d4a4b0c15ebbde4b3b751b760748155d1cdf025f136cedc0af6b84ab17618f1e9a166c80dddf6ea0b4551db2296ec71eb44f
-
Filesize
2KB
MD55bcd8b86c272c5a217227d289287cf61
SHA1f4550aed8e7b158f22968a80df8ef6a9a6784573
SHA256496ad872e05e4f017e8bd1a35bd4be0fcd72511efc89494d5c71a034c8bd5971
SHA512b339cc4a1eea9f74d6e9a38372394b5c96689c8a82bc47aa9e5c53db3064f89f099fdf27899563c35da823eb9b9604efd0d5526abad67b1329f341ad12c53822
-
Filesize
371B
MD54885463d4200dff5d6bf7965045284b7
SHA146996382a734b10d399d92cb616e40673b045f0d
SHA2560d7475f67675fe8db5f5809ba8f085b2fe811364b070275bb8c2f16051d375de
SHA5125815f3910022e5717d52d5117dcf1ac306478e6c43dc2dbde1044bcbd0ff2a51b682c40508800e82fe5f63880562594a0d1b2de6cdcdff2614c8e9876b209e4d
-
Filesize
539B
MD5d6edb200b3a3b33c4c4be75f1f48c0a7
SHA1217336cc2be07998e56f622f036472368a957421
SHA25605a67977438ad4fc6a094abba8478e6a904c7c96e6343ec59d494a55071a8723
SHA51200cd5b06b3f142563063ddbd695c31e950c3736f3283398946621566dc1f026a288ffef8e7f62cd1a7d5ea367a8926ce6e5196c8128790c1a7aea5ca0b1ed0cc
-
Filesize
706B
MD5641169cd43435b7faa88e9461ab805ab
SHA1c8eff8b5935e526f72a0cda3a127e2b4af37a970
SHA2567cc73b71a71ccc28d89d8a9a9b6f5878520ed9a47223ed2624c050d6d9a2e987
SHA51237b9df71c0c71ecb28b7cfc6c07605d73fe0677290b9b05d4da9f3902ff0c81075a4ab7ede16e4ef1207a99e5b177afa5975c3df8122ac21fa167611273a8a11
-
Filesize
6KB
MD539e63756522df7bb280130802ab164fa
SHA10aaf73b29d3da16eb6c64b1ffdf2c135251d087e
SHA2569f2d78a29ec851280cdba678754a43a70a4ebbf2c5c34c4a7eb8d868afc8763b
SHA512c5e96561ee08ce5ff972ca62f2476dbe25db5cda44b97d46eda5c64f888e95f78299ab7428f5a3a94dfa869bd1795aa138d8723e939ba10925f1aeccb706dc35
-
Filesize
6KB
MD53bbfab08e9e5b56b28f0e6172c759a4e
SHA17c44020d47120eec3dd1e0a67498a511cf880db3
SHA256a51fbbc8df9978dcdd9e29d25b6990aabd043b571b0226d687a5c61c4fa6b50b
SHA512c7556bd53e6a6b9ae012664314d9ecf3492c5af824e76e74d989ab6db00e76a9804f31d35959c5b789371fd4a46864e06de3c62a47fbe8c410b7cc1ead8bb7e6
-
Filesize
101KB
MD55ec4f81e188f7d7cbdf3f7e2c5855027
SHA172851b42b6db8231509516dd6b813888116b2bad
SHA2567c9fb2946e1aa2165b7ffd28ec7ecdf170be5c7f6c4a0b2b7ce27244514f9ad2
SHA512528a515580aef63161b1c409a2668e72ef3a76d1c5e011b5b9d016b53af1e6d451527302d8ebe4e6c1a3df7881447d4eb54336434c29e955c48f19bcff73cffb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd