Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 11:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://abertura.ramper.com.br/email/aberturaBounce/6540e919b09da2a2a538c574
Resource
win10v2004-20231020-en
General
-
Target
https://abertura.ramper.com.br/email/aberturaBounce/6540e919b09da2a2a538c574
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433135500258067" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 1316 chrome.exe 1316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3880 4940 chrome.exe 50 PID 4940 wrote to memory of 3880 4940 chrome.exe 50 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 2812 4940 chrome.exe 88 PID 4940 wrote to memory of 1840 4940 chrome.exe 89 PID 4940 wrote to memory of 1840 4940 chrome.exe 89 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90 PID 4940 wrote to memory of 3760 4940 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://abertura.ramper.com.br/email/aberturaBounce/6540e919b09da2a2a538c5741⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb06049758,0x7ffb06049768,0x7ffb060497782⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:22⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:12⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3764 --field-trial-handle=1892,i,5378669322445097817,17635116087053842943,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD53ed497cf7471aa7c2a5adeff3b72dcae
SHA137bc6519d8eb4c8c701a35cafa13e9b5bf9abc0f
SHA256bebcb10c51826b50ef423eaa194a29c3679868d4ed6aec29de6027ab4fce7bb4
SHA51265fdded34fba7a0336ce12d35b08408b9d5192d7b151769c2908f6a7ed9ee84e851de4a333b472afe46fb13c55c8f3ab90a8e98aa59319785de714ce0f0d2195
-
Filesize
6KB
MD504f336bf605d77b8d953804e22eeb760
SHA183ffe17667a357843971c208f0cb73e93cc07916
SHA2565c2a338d956da8ad0735f6ae1e616d4c1e0ff9e39bc314d301b0c0aeccacce5b
SHA512e7ad64540830ac63ca1aab9f56e162e5d6bed25f6e8bc6ffc631fb0aba754c4f4395d53ac5c849759392577f2e79ea4d41ec7aafe4405cc69679c5bed97e2e0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd