Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 23:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dev-bancavirtualbanruralcomgtcbseguridad.pantheonsite.io/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://dev-bancavirtualbanruralcomgtcbseguridad.pantheonsite.io/
Resource
win10v2004-20231215-en
General
-
Target
https://dev-bancavirtualbanruralcomgtcbseguridad.pantheonsite.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 2308 836 chrome.exe 28 PID 836 wrote to memory of 2308 836 chrome.exe 28 PID 836 wrote to memory of 2308 836 chrome.exe 28 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2372 836 chrome.exe 30 PID 836 wrote to memory of 2960 836 chrome.exe 31 PID 836 wrote to memory of 2960 836 chrome.exe 31 PID 836 wrote to memory of 2960 836 chrome.exe 31 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32 PID 836 wrote to memory of 2772 836 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dev-bancavirtualbanruralcomgtcbseguridad.pantheonsite.io/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66b9758,0x7fef66b9768,0x7fef66b97782⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:22⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:22⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1412 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3484 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4148 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4268 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 --field-trial-handle=1296,i,2969606739440744658,7994888721366804627,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890918934ac6ac6a890b1965bf1bc40d
SHA1a6fb034460a0177b16904689306492d3d7a36d2a
SHA25621f4f6a52befb8f97c5a6c8c580d8b0972ed651719cc98b5fba0210f792dbb75
SHA51289f8a4c56d4f2a2d529a99b9161a9c69e3984d6d60cac9d2cb05b21e08375342940420bbf2b5fb05474fed9d5f7e3e8acf05cad0ef797f2dd45079798aeb6308
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5f8912a36ea0038bf0b587f74263ae0bb
SHA1130925ef0a2389c5d36ce4197cd1fb29680284cd
SHA256c99879d51f5d41e4baee9bc86facee62df5e6ac3f4c6cb07accb28b1a35c2c56
SHA5124fa7c2f0063a755c64e75dd9e6cc95ec691dd4ab0c9cc49942d16c3e6e83fd4266c31ec65dcadfa0b4da99b4ff4a1f9b28314d5f4315acf43ed8d4140dab48e3
-
Filesize
4KB
MD55e24ca0a0f8707e48fca04d064fe614b
SHA1d54a70014288bbcfcc5026912967a5f10320e27f
SHA256b46f555416bdcc87d0c0db1a0de82ef1c37f4012462264f00d23abadc068cd1c
SHA5122b47ed686ef5ac939ab874d4c3aab3d869af2ebe84b4f752e88522a9840966ee88c8d3ef194219011cc64adea1d6b3a36b72bcbfd62802840d441f88633a73a2
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06