Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26/12/2023, 14:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dev-bancaenlineabantrab2023.pantheonsite.io/
Resource
win10-20231215-en
General
-
Target
https://dev-bancaenlineabantrab2023.pantheonsite.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133480748277145993" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1828 chrome.exe 1828 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1828 chrome.exe 1828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeCreatePagefilePrivilege 1828 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe 1828 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4236 1828 chrome.exe 73 PID 1828 wrote to memory of 4236 1828 chrome.exe 73 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 760 1828 chrome.exe 76 PID 1828 wrote to memory of 3516 1828 chrome.exe 75 PID 1828 wrote to memory of 3516 1828 chrome.exe 75 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77 PID 1828 wrote to memory of 4596 1828 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dev-bancaenlineabantrab2023.pantheonsite.io/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdb6119758,0x7ffdb6119768,0x7ffdb61197782⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:22⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 --field-trial-handle=1784,i,72861661175157172,2091628457313191405,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5c4c6ae53dea7a4976a9f7e490bf8ccad
SHA195ddd26e9cd5f1c06601884386093e31b263ab19
SHA25626bc8680fd489a0e7d614ec4aa718d034a2256d0dbda1c83c690de6c0216a43e
SHA5120dcf76e7e8557560e2443830d977a077b596bdcecde0187ace72e87cea19ef9cf4d12e9c6fc523d517f43b1292313a32a140f7c8cbe2d898ac59c9930c392a73
-
Filesize
1KB
MD5d485f6608b9d43a382711896da14f490
SHA143a75130086edac1f4967f7ea547dc6b69e86205
SHA256124ee0bb5e4f75042f04c1ab12adf05cd3d49e2db3b0a203d979258bad0f6748
SHA512b06a19d04d6ef2c9ee79b21b80c624a60cbe7405547c4c61356dd523bf63557196295ff20c31cabcb53e8e9ff93f3a9de2bbef6331d6efa39841c5d2793d4725
-
Filesize
874B
MD505e688601098b1b8eac1016a7ae8ed5f
SHA12654a4ba149b2be030590da96e34520623187ad7
SHA2566b8c3b9dcb16c17f8964640c7c2f7398d766e2efea30b3e0af3c2afb7e58e5c9
SHA5127a8d533639f53747960ed7f31a04ff607fed49efd560d1b7542d263f0b9595bb32403131c4c8ca27fcd43836838bf9e11c86c23bdefcad2c94b99ab7ccce02c9
-
Filesize
5KB
MD5836e7b807d7c5c4c61a147cfad4260a7
SHA147171d968582165bed20c3b98747ae85af4a7159
SHA256f44a6c06bd30a8432b422d803b8f3cfe4c74fd3ded4a9fd190cdf1011acef571
SHA5126d8020b707a461ada70eb87f181206bf1e8f2880a669730a6215a25d80412e34451b7cbadd758638843ce7453a38a4e974bebf47dcc1606d86122812bfab8732
-
Filesize
6KB
MD51a687ce8bdfd4f65bd316b19bf4ae7cb
SHA1e4fb4c8eb2f520ecb4997fd780b7ecec4d1e4f52
SHA256479455688fe2a71383558a3a577d861a27310ae3ee6e3200c2e0bcec8bbd8b82
SHA51257fd58b21571e9eadb512592240b6a18add074ac31cf039ebb8944eb8c505bfd9fb42644aaa960eef30ca160cb44242cf1fa9e8b64231f5cb26ef4e3e2d1dc17
-
Filesize
5KB
MD59824d9f94ed7c9bafea34feb24a7e0ae
SHA1e8c299bcd8ed4a57e22ef6873868073a2bdee88c
SHA2563188aed1615f5433934edffd92fa951cc0825fb025549397ef3072bb8d0d8718
SHA512805e5677cd1ba1781d9d30beef2e41cdfcaf084e4d88c6510b20ef48312961f5b1a24db07d6f158fe5cffc78ab4c6960d082a50360cbb62e9d60c9594e69b5a1
-
Filesize
114KB
MD595ce545d1916d0e1a709bfbc46a419f0
SHA1793a559c33890c9fa9cd903b65b052bad8ea4cf4
SHA25645f54435eee0a9dcc4abee2173de08b864d54cc174849071f1439d83b67b5cf7
SHA512b9c28e43a462ce9d0794e3e74c16208fe3165191ddb511834f0837f814bb585db9a67873866825d3453a1f0f7937d6ed0fa2ca807a9a17ba78459a248eb4e8ea
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd