Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-es -
resource tags
arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23-11-2023 08:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://amavidarealtors.com
Resource
win10v2004-20231023-es
General
-
Target
http://amavidarealtors.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133452007761711321" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4172 chrome.exe 4172 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4920 4172 chrome.exe 49 PID 4172 wrote to memory of 4920 4172 chrome.exe 49 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 3232 4172 chrome.exe 87 PID 4172 wrote to memory of 2816 4172 chrome.exe 88 PID 4172 wrote to memory of 2816 4172 chrome.exe 88 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89 PID 4172 wrote to memory of 1932 4172 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://amavidarealtors.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbee0e9758,0x7ffbee0e9768,0x7ffbee0e97782⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:22⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2776 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4660 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 --field-trial-handle=1708,i,9851872224456020741,10973680124666007319,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5edaf048bd7ba20ddbe2850bea8886831
SHA1017343bb9516075a32ef9d11d4e60c245d660e77
SHA256c75ff4eb0faf43aa7d34b611fb761b6008285c45345d0b24efc756591604275b
SHA5129ebf09f42f20b045c32ff5fb5e6e70f564b6e4716f5b9103989db9c49a0968d6a457e5c1244d7bd65865a0b31d397bba1a6c54d78cff81318b1e4c81f16f2be2
-
Filesize
1KB
MD578dc00542b1a41e8121e3c77521ba238
SHA109f9a6efe2ff6d93981a5fc1cb0e1cc116109d91
SHA256f25f12d592eab3398a92df648dfbc62399342e22afbdc930ba626f9da1fbd8db
SHA51291c88d99490e885f8cc657b8bad90e52b56cf8106eba6b75461b484ce36ceecd0fca48969a2850e490ac2f5d1f439f88590d9845131ba4076ae204ce24676fa4
-
Filesize
6KB
MD52434d87e49c4adb0dd436d4aa714e301
SHA19941999247e33520795ed3bd86caa971d77836d6
SHA256f1ea0c715b2048fa875f651098a1c4c2187baec418e647bfb75c15aa6b508cdc
SHA5126f70f9f95fb93d7a07d02784117e0276ee242497fdf875d9188bf97cd6514f9a723ff526817516d54eee145c97743e4ba87d5aa36b8cf22fa0cf2da3a084f3f7
-
Filesize
109KB
MD500753a1dc212d50c147abd85060fa22e
SHA1ba53ca48f50449e8b1456eaac2b05b5ce031ac77
SHA256bfa1d34fc3d089f723ea2ccd93f70729eb45f4aba3d66f035849b85a6af835de
SHA5128908580e8399600fc965454baf75dc5258f52dcdf7a9dac778347c475c2adb761a8df101a33df7fb1a2f72d0c98d44be8d1c33cd099e5e3582d949a66e7867e8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd