Analysis
-
max time kernel
181s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-es -
resource tags
arch:x64arch:x86image:win10v2004-20231025-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20/11/2023, 17:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://blog.nativediscount.com
Resource
win10v2004-20231025-es
General
-
Target
http://blog.nativediscount.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449752611497465" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 1752 4476 chrome.exe 58 PID 4476 wrote to memory of 1752 4476 chrome.exe 58 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 4376 4476 chrome.exe 88 PID 4476 wrote to memory of 2576 4476 chrome.exe 89 PID 4476 wrote to memory of 2576 4476 chrome.exe 89 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92 PID 4476 wrote to memory of 3972 4476 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://blog.nativediscount.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddc139758,0x7ffddc139768,0x7ffddc1397782⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:22⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4664 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5216 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3348 --field-trial-handle=1872,i,8653285584062059330,14032783242949035990,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2252
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:6088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD507ff2df49f1e6c8dfaef1a802bc9da30
SHA1bc6febcdc870c2eb98efab4e28b68cd6e02a9dcf
SHA256ab76db74e47885d5774750bb4354d1c52414f89bcd9108fb85e9320e4baf0bd2
SHA512cc6e7f111f4d733c1bc782d503ecaad25aeb22a90090d18fb592977dcabf4a96f61f73c7e706a83d2442aea2b52c3241103c4215c7f3405882b3b2cb66c00656
-
Filesize
672B
MD5f4505f02b59e20b1bb2ced176c0e2521
SHA112332b4dc3a0bc2be50473efbec12575f6c32cfb
SHA256404f4b84e6a898846d14b79160a721c6b9100ba766815fb3d21d99a4b829535b
SHA512f18da6277016fec6e2d82c07ffb30973d1c15ce274db88dc803dec38dfd35897b27df51827b0ea7b3b4ac13d5111472d80f5b49e17b547d0b7c10d597d320828
-
Filesize
4KB
MD5cdc79a1a9dc404f2d4cfe6b47cecb354
SHA14bd97c7bae8ffda4105337c06501cf50f53c7afd
SHA2566b04e8e646188c5e0020b042ea29ef10633ca48af27cb9497990410bde8669f9
SHA5122add544b393f007c1a39be2366d11a7e2d1f40b27a6cec62288d97bb5c6b2c26c32c3177cb71c60e19b3b196d7252dfa2d97190ea5a29d50aba85f0243a9a66a
-
Filesize
1KB
MD57106d147b6e4aac3877ce1500fcb9bf5
SHA1fe3d9704ebc343c8f12b9d23e7c8644b7d4bb3d3
SHA256ac6bf0fef49899f58aa190678a876e13618547bb52d7c7cd3318eff446248520
SHA512a93f83ac3e509219586fdda94d3d2a08a7f0ce9fc8f38fb5694d29b2cee2696271d20c898f89e29937cdd6bde3d1062593e9a94e642eb968cb4dafd6bca23c32
-
Filesize
1KB
MD57834ad3ffd1007c7816aa5d5fa1b5c76
SHA1d2d3bfe6819625f0fd952192da8f9329c6a192c8
SHA256554d98ae73126f53a6498f5969931e3180bc4e50afc27de326072247944c97d6
SHA51289fd83fa67bec246e7da6339b7a00b2205aa89d706c9bb24b1e763234b15fb3dad2612ee5664fdadef31b9fc1a462b2c25931a20f092926fb26f556cca6c68a8
-
Filesize
6KB
MD5c41b43e2222e668c9e1da812a22cfe0c
SHA10d10e86ca2b1e527adaf7af997e03327053c9719
SHA256aa9d39a906c588642e7c1044352856be0842315d7e7de6de2526ed2b72f661d7
SHA51263c59aa67903fc5c797c6b27420d5046e41dcde2a0237e7b88cf67fc191f6c366ddb0252e74fc349027823d635523602a91078a53ca4d97d7b1c357c7186a2f7
-
Filesize
6KB
MD53eaa0e7ad543c8932751d3f2885d6d00
SHA186bfb227905513e1d17be1cf5b9d069639057946
SHA256a67c8e924fd59b60a08a1b637f7169bb2b6b1f63372e03f3bf8aac6fb1640026
SHA51297ffe4574946c429dad71f9f0f7346278c4415ab27f05a4b090b44700ed68792cf081b24482a20ffd5f8e8a1bec0bdb9e75add52ea7e1f4948251eda58727b6d
-
Filesize
215KB
MD537238267161e72beb24f1af5c37fc871
SHA148f40b55057059145b5d87a2bb7ed3e421f513fc
SHA256198ef9e78129d3011d7e4caafacdc42b6bfbc9ac38f8c4cca681f557db1301c4
SHA51258c8eccfd07d282515c678a65a7d5b408f154fe2f3001fdc9d65016d77a42526ff6959434017e4abb5d68fe4807949cf892a9cf76fbcce4836f14f0e70392e48
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd