Analysis
-
max time kernel
56s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 16:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://eldorado-nfse.govcloud.com.br/nfse.portal/Prestador/Nota/VisualizarDetalhes?nota=jZdNXnnLNt0=
Resource
win10v2004-20231023-en
General
-
Target
http://eldorado-nfse.govcloud.com.br/nfse.portal/Prestador/Nota/VisualizarDetalhes?nota=jZdNXnnLNt0=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450580181563449" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4896 5020 chrome.exe 85 PID 5020 wrote to memory of 4896 5020 chrome.exe 85 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 588 5020 chrome.exe 88 PID 5020 wrote to memory of 2728 5020 chrome.exe 89 PID 5020 wrote to memory of 2728 5020 chrome.exe 89 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90 PID 5020 wrote to memory of 3908 5020 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://eldorado-nfse.govcloud.com.br/nfse.portal/Prestador/Nota/VisualizarDetalhes?nota=jZdNXnnLNt0=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9069d9758,0x7ff9069d9768,0x7ff9069d97782⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:22⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4580 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4428 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3748 --field-trial-handle=1872,i,14799977567250815292,3620073133794391261,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ff8174d88051df6fd76602e58aac623d
SHA1d64b38d3d7a87dc5bb7c62738939f9b50b6d2d52
SHA2568fd20f30992b90aa1b70838420ad1fac8bbd9a41cc8a359f3c120b11b9cc4009
SHA5122c1bfc50b7591df90b13b557ff7c91bf92f1475798d2ddff7124c734d751ddfc5d70c35a7ada03073a7dd26c8a703c6a513b410d80acedaab8739e21cbad5776
-
Filesize
5KB
MD5191c680223bc30cb1d28dcedc7bd1f20
SHA188731b4f86ef7ecde109865bcf0bc172efcd4917
SHA256c58814c77e241bdc3111c3ceadd60e9db65ac64e62750caeeedf3267db14181e
SHA512c7fa43c2c9f737cc4aa2442e640bfe32adbbf1d08daee9ca456fbb08db6928924b0d1aea45fb7b3d8d52307cd4ce51a716bdd0c60680dc1ed8acf3717c0ce905
-
Filesize
109KB
MD5d8e41c5e99b80a216457e6224d0f67f9
SHA154ce7a0d35e60f8b3e0468343ce1d3aec23ea931
SHA25696595cdf53696ef7b84a272f3e79b37065eb01e84ac8ca1ef60e908277af1036
SHA512346d5977f0540f9b4259b104f7f7e523e3736a5b7f5c21c6c81f51e3305c59f7fe5a946f6c925586c77cda322d8b9a30e7a92c0625b58750c9c670784039339d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd