Analysis
-
max time kernel
189s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 22:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ruralnet.com.ar/
Resource
win10v2004-20231023-en
General
-
Target
http://ruralnet.com.ar/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446488620483330" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 220 chrome.exe 220 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4068 220 chrome.exe 86 PID 220 wrote to memory of 4068 220 chrome.exe 86 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 824 220 chrome.exe 91 PID 220 wrote to memory of 4568 220 chrome.exe 92 PID 220 wrote to memory of 4568 220 chrome.exe 92 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93 PID 220 wrote to memory of 4908 220 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ruralnet.com.ar/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e93e9758,0x7ff8e93e9768,0x7ff8e93e97782⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:22⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2768 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:12⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4592 --field-trial-handle=1876,i,1771573076147024945,17505944986784566038,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f2ebedd74255a268eb5ea3bad08d2366
SHA1ebaac1263b00e7f5ca0609632569d8585c16720f
SHA25633dd1332c4c8add0ff7e8ea7aa170f9ff4a0e3d02feb730804f4f7c5a7f1815f
SHA512902c0c601ccdf7aec3e2d877db0ca68d5de7a7fc98b8b1d89f2035d65195de6a10d035fa4be82ef5bb6a83dc37e387abcf708c7ff1cba7db9a9c47aae32d63a4
-
Filesize
706B
MD5dea57d0c49dd0501c78a1817a92cfe74
SHA1a3a191fde2bff0b2daa0f40e037eac406d5fb572
SHA256c2854025fc3eaa82b07e5494679003eb082434f911afc94f5d4f79ec03aad5e1
SHA512a166dbea03059e9deb2fde22a763b9ae557818a3c989a9d8b3626cd289c6af468a225f2b785e3e6c134dc40e50c076be5ac5cbef56b52551a8a3f0e614c1f289
-
Filesize
6KB
MD59eb9404ed434598e4042cd005885477f
SHA162308371fe79dd82e9201498e025d2477829916d
SHA2565987c091801848f01d6107e2381227a9b8d7f3db6af0ad0f04d8df4c0ddde829
SHA512766ee7d535022b3f6eb909c5de4f167e5c0dfd77879a93b159bab91f4ef35907b9e753fc180907bccc816c44f7652997abd6e10a87b021fd136b25d496faee4f
-
Filesize
6KB
MD5a9b5ff659e4df8e68fc7948ab6129bca
SHA197120dae9b88a1f4a1795453b08496116bbaf48b
SHA2567b1ece19c7dd0cd56e7bf860b8d7341dde4da86554619f86938f926e8a016ebd
SHA512d5707aa51afa33ac2a21184dd2660fac7ef876ede09b7cbf7ee035eff008395fd3089577ecfd2f8b97b242529e9cc3711ab96b1016cd4ebc7e7da3aa60e880e7
-
Filesize
214KB
MD54ce8264a6d90663cbd98c38497192731
SHA1d3b39c0b891e2a6aa87521bc8e9b4a614025db75
SHA2566928c0b60156913877428430e00295983b129e863cc01a6577b1897b1b77513e
SHA5123b6439e261c1ceb6112bbd45b1840bb9deaa4a68ca760fc8af505741379843dd1c028ae8ecd15b65fa2160c8acf145a2922de96f258c3fbc822097ccf49d15da
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd