Analysis
-
max time kernel
300s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-11-2023 20:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://agexport.org.gt
Resource
win10v2004-20231020-es
General
-
Target
http://agexport.org.gt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449865215877796" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3480 2024 chrome.exe 54 PID 2024 wrote to memory of 3480 2024 chrome.exe 54 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 1516 2024 chrome.exe 86 PID 2024 wrote to memory of 4624 2024 chrome.exe 87 PID 2024 wrote to memory of 4624 2024 chrome.exe 87 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88 PID 2024 wrote to memory of 2152 2024 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://agexport.org.gt1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa13119758,0x7ffa13119768,0x7ffa131197782⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3848 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:82⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3904 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 --field-trial-handle=1872,i,9120531800709029492,16898718975109017090,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\21f47740-4eb4-4444-8dbb-3cbf911c4a99.tmp
Filesize6KB
MD5e04aa4fec506130e153dd3e85006b1d9
SHA1e124b4a79d6748b58ef57e770f84c6a6deccc96b
SHA2565e6f3872bebad2b94fdd1951e7a19e7462887ccc3f69feb7f68131a0d2c80a73
SHA512f8adf515b07b8723abe209eb83292bbc392f2a445538dd0ec2205077495849fe42bfd6fb4dbf33e7aa9022c9ec9773d7bb394c07b13bc1f004c3527d0d72b4e2
-
Filesize
264B
MD53f53cf342f76dbc2a2d6753f96ecbf43
SHA1bd3e1f22c37a5c9cf064dba539fd533b1986561b
SHA256a35287c448b6e90330f8501828686789959efd56d3a4807012828051dc75e963
SHA512a8fd714fd70c1393db100d107a7f3702d2490254c7fd14f10e457a4f2400d8c91604168484df63c5ab98f72a402798351a0a68a73a0c18eacd76459fd46516b0
-
Filesize
1KB
MD51b3dff67758b4546245313164dbc5f55
SHA1863496c21b6894bf01f78de33b18bf8d59b290e8
SHA25643d8acc3d00bbb9bcfb81fd1f1510ab931c5c43838a8a43f6c25c760fb290094
SHA5120ace24bd1e4c8a575577134cbb28d01e830009ff0532b272e1254e837605f5b43e910202616fe442ecd9341e40ec99a6b86e1585ee8cb2f6dc6301f83d5abd60
-
Filesize
1KB
MD5f62e43c79b1eea215c70159385a9cb2e
SHA1342796b7a8cf83ee565cb021afbe75b521b2bf67
SHA25606d6e682de014e0fa2a61fdd0439583070a0eda311b37dd6a4c27310127c04cd
SHA512158cb94553eccb128720f0e1c724c9e6f6c348b3c1b1eeb537e0368675a958ef1655fd9c77177ab915fb63d0d05712aa3377ecf81fb67e99d120d72de2438157
-
Filesize
109KB
MD5368ab94f432c1adf0ecb3ba7c64660bd
SHA13becd7dd64dde2e42d2c5fe2798e19a1cc9e7323
SHA25631218e8bf0d29c38b2c656f5ae6be86085485087f4e2bc5d2c1e762b0d4f0106
SHA51234d95d429dcb2f9e71eae8e914b157c9e44fabb438ee718c9681e0683d8c83c2679fcff1c7c04971eed196ad1f5f8da49362eb19ba26226ab6340631fd53ce66
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd