Analysis
-
max time kernel
130s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/12/2023, 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://seguridadpenitenciaria.gob.ec
Resource
win10v2004-20231215-es
General
-
Target
http://seguridadpenitenciaria.gob.ec
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133477377228856915" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2980 2084 chrome.exe 28 PID 2084 wrote to memory of 2980 2084 chrome.exe 28 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 2876 2084 chrome.exe 91 PID 2084 wrote to memory of 4560 2084 chrome.exe 92 PID 2084 wrote to memory of 4560 2084 chrome.exe 92 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93 PID 2084 wrote to memory of 4864 2084 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://seguridadpenitenciaria.gob.ec1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xdc,0xe0,0xe4,0xd8,0x108,0x7ffe9aba9758,0x7ffe9aba9768,0x7ffe9aba97782⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:22⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4904 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3428 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3748 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=212 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4644 --field-trial-handle=1960,i,10160375449266761439,2901998633323769265,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52e6eaf3ad6eecf03a330e4c0a199a6a2
SHA1d56e65d4ab026254182cfb3783f7adad6a93a90d
SHA256ceeecca0f8cb7028c568748150f7c76ee5fb90761f1b3de1d8e67891ad30855c
SHA512bd9c248ae4b8de1c567ea0c6d7d98a506744f1387790eacdc82bbff453e760ad7e789ad08452da6443689a8466cbfec0d055d4ea2427bf02f7d53bcd81f70f46
-
Filesize
6KB
MD5cacb8c8f57f6862971345193f238b194
SHA11b39bbbe21fc1b19099997b6afec3514163a5c5b
SHA256bafda5855b99e7201767e47c6aa942bba32954ddcd53b863376a4a731d8891b7
SHA5120378277fc3b812f5e3bdec8d5fe34f9b779de9da747d9cf875f6e3a7441fb116ef960194aa3251e05f8c8f4955b1a68fbccb5b6070a95f81ad5e65e94eaf4a24
-
Filesize
114KB
MD5aa577302c209552af71c25d67f786cff
SHA16baf0d1624e149a13260dc8d91af83881f77bb5a
SHA2569cb98bff8b88b0efdcfcde219f353ecd3dc7bc92f11969ba4ed207aace725d17
SHA5124864072694d0b123a3bd57127ed355658d797664d169af0ca91d45fc8fa02ebb3ed702077bea06b266a2832388c0207b253fb8c6f2ad88729dce9364e15cdfa1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd