Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-es -
resource tags
arch:x64arch:x86image:win10v2004-20231127-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-12-2023 12:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://unitoapp.com
Resource
win7-20231201-es
Behavioral task
behavioral2
Sample
http://unitoapp.com
Resource
win10v2004-20231127-es
General
-
Target
http://unitoapp.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468573613849466" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe Token: SeShutdownPrivilege 3464 chrome.exe Token: SeCreatePagefilePrivilege 3464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe 3464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 2984 3464 chrome.exe 81 PID 3464 wrote to memory of 2984 3464 chrome.exe 81 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3368 3464 chrome.exe 85 PID 3464 wrote to memory of 3900 3464 chrome.exe 86 PID 3464 wrote to memory of 3900 3464 chrome.exe 86 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87 PID 3464 wrote to memory of 3576 3464 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://unitoapp.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffaec259758,0x7ffaec259768,0x7ffaec2597782⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:22⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4540 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 --field-trial-handle=1900,i,218516008042084368,1321537291612956556,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD51a9164d42412a30ed8308b6b6fe8a46a
SHA197cca4c151be2662cf6a4727d838d5e6783b3c31
SHA256c10cf9cf152cd8a3d23c64d4797eb6eac962b7ff13c3899a7e9ed1919f417614
SHA512341408f882edcdd208f89436a3c3162864a9fb0766dfce5e815a12247942b4679bb55e991f0db990a56cf7bc5ff69d3edf0e20c5645539447f6846de08fd8d79
-
Filesize
1KB
MD5056a9b2a426ca6200a6ac8d165fe0c78
SHA10854b2dcecee4fad0cfe48c8d6ce231ef5c43373
SHA2565d66b37467ccb913cea6fb28e42f4634b9834e6ca58a929e913cb3e45dd2d324
SHA51208b9d1ec9aa33b6fb040f2f0d183af980c1a8dda9735d3e0abf32ad5877e19731ebb2636ceaff2d5f9394dfc255dc04740c42a62e7e414a1a576c631d75a76a3
-
Filesize
5KB
MD5bb5954080b6394d4c8d8de8701762449
SHA18d82c581777b57615246303f0bacf6cad563b7b5
SHA256c7b33394b501a0f5ed03775e183d2a29331b730257741f7745c302fd19a66c59
SHA5126de1d3e5ef101fdd3ee0e0a2f2ff057cf953dcb3bd3f3e0fc9501bbed771683eb7a7f2561c259533ec436deae622da9a54a65c47eda0918681f7ab457050b1f2
-
Filesize
5KB
MD5d9a5444a65bf4ffe49433b8d04154171
SHA1f6c000f47d7524acaaf45fa60f22c364df995c51
SHA2565693870ff5d0d7457b150a1fc85d9ab990dfe873e0ae86be1359c70cfa46e0ee
SHA512a3d8137db96f2a7db5766e2830fc87b2299efca709d3ff8479686282f191fbd2a05b1c6469d6485eacc297f1f111a514aa77000163f8fe9886106785ba0e042a
-
Filesize
6KB
MD580c9efab49e5d5f156c58dc24c655a48
SHA1dac49ac0e1c65f05efa4518d9b23b1cae5fde3eb
SHA256bfcd30041566aad78fa1a5c72555f3dc59db5791464ee99f23db4994cdeeccbe
SHA5129c998b5d66f246f0090b7b7427479945c5f472b3b2e8ef368ac62aab7cc00f30871da1d019cc27a80cf230e2276528a3e10716acbd5b38ebab41e6a36a765679
-
Filesize
115KB
MD5b90b260c3516dc0465a25a6c93e4ade1
SHA1a009ebdaed36f52da22f48e9e60327c72abbfb8c
SHA25649407f2299c7bf49cc435cde6ef1435886c05c16145e4826375ea2671aa2774c
SHA5127ae2bd72805b0d9d9935855a9e0ea5d83786e5bfe6e6fe9e897971fc65e27794549ca065e780e5a79acecb9b937204f3feb19fb3c61637236b0cae539dfaaef3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd