Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 08:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.spaoneandonly.cl/
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
https://www.spaoneandonly.cl/
Resource
android-33-x64-arm64-20231215-en
General
-
Target
https://www.spaoneandonly.cl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487451253959927" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 828 4016 chrome.exe 32 PID 4016 wrote to memory of 828 4016 chrome.exe 32 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 2512 4016 chrome.exe 90 PID 4016 wrote to memory of 3932 4016 chrome.exe 91 PID 4016 wrote to memory of 3932 4016 chrome.exe 91 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92 PID 4016 wrote to memory of 3556 4016 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.spaoneandonly.cl/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffbaac79758,0x7ffbaac79768,0x7ffbaac797782⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=400 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:22⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 --field-trial-handle=1916,i,388206397146511400,11787006672605513829,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c24b74373a3c28dc9236a9b760f2e5b9
SHA16fdc7e62164c44773bc52d05e13d5db8561dfebb
SHA2569df74bc4374747dd60520632bf328abb74d3201cc38c1d630469f81ce6085586
SHA5124d974ec5050207ed43aef5fd35b483a695ce8511798256f20b8c9183116f7130c810d50301077aefe63f243d18b1f7c4a93401cef23d46494ef8d199dfb00188
-
Filesize
1KB
MD5437ff5eda0b721103926e94092099889
SHA124d4e8f6b1fd7735c316c71255341129c861cf22
SHA256da7a6a3e1241202b7d0233300418cb76e04ab4a28698bf75eb90dd3b26895e20
SHA51268e27a477ee299ab10ae4a661321513cf8ff643bebed365ee1a2ab27b52c358f65212d61768cc986f026270e9ef39a4445df715ead43556e5e26104689e29bf5
-
Filesize
1KB
MD5cab2680d26dee66697b067959f695736
SHA10c0c4e72a36d465f035552a4d796d0bb44eed888
SHA256c57076599ad9d62fee28a728c9e3d6465b938579785732afa02bbf43efd0a20f
SHA5127be028dd7f6d827af434de7eae912ec06742bfe5af03f0154b09841ac4611ab0e1d127a705c84f4c1082e2566e377c4b964cdff02c070a6f5640c752db97fc6f
-
Filesize
3KB
MD54cc630dbeeecd1699e7a6bcd7a45bcc6
SHA167c56291db3a8915ba15f336e00ee444f3cb2c88
SHA256109dd7698ea566d4647312ea5c8d8b664d8625d88adee8afed68e6cba86b2070
SHA512234ce87faff1bd60e6ed9d108a310390cdbac5358e99c77adff38c8e469862daf5ef7f4bbfd54ebc8e07b247454717c9ccf202eb13fc7bd7d501ec37be1b9d41
-
Filesize
3KB
MD5ce14f9a35031e743929e8c6388236b24
SHA1497e1c32410a56d26e9c05d387d68f910b5246a5
SHA256f338f3d046073226618355ce06adfe0120526c117037afcc1dc9a636199e5491
SHA5120b026f928ff32fc8a921c7a9fae5bab34830c4eacdb4016fc8cba95059c9b2b2e8b41db143a86974ea2357aa432cc1898f1b95570df500d966a4124479ece884
-
Filesize
1KB
MD507fbcea32c57120ca44f772aa277fd6a
SHA15d03421d758b9c3f742dba9c452ee736f2bbb2b3
SHA256f1733654ef96fbe7af219399b24c75b9dd82f4e3ac6caa41597c4e2f19f3ca57
SHA512d1a09f74bec49af138fa1aaef862d5d59e5901966c227a0e655e9f636b3d5b496bb8fd8869aca4e8604407c38b28ea46bac18b58161a0eeb293b4dd7e3fb50c1
-
Filesize
1KB
MD53f45406827b5ad423656fc85e5c7d440
SHA18e731dc90135ef41cbbb4a5c049f9d3915adb691
SHA25652940428022abd9d2bcc752aa124cc925857e03116be072e52de56dec2cb6be8
SHA512d1b6bbb67c0b0f33c0ac803d55d4dcca1877f27b30c577f202c05616bcbb70f9285ba8d1349447ffc9f1fad1713b4c39c096cf8db074af5f76f0f2e3908ce98a
-
Filesize
6KB
MD55fc7f0ebcf9303e45a908295b45b6fb5
SHA16cdecc0113b9a29ffb62a3fdb020183003e39d49
SHA256763a688786e4a204b8e32cc7938485fd0f3e367da7438b67db0c79a926f28cf6
SHA5123952f6fa78da4ab20af20ac5aa276c8a100e789f8bdbd2e5831720925d96d687045bcd5fed48ff0c24287ceb9158651fb4ff22ab702f6246e6a193f38a1f3375
-
Filesize
114KB
MD581786c662922f418689bbe82dcf4c33c
SHA1724a7a89f3c33e05d1be37fc4762485682187747
SHA2564444be563ef02da7c173397a4710c095b6d725607c4f5bd888cd1c972371430d
SHA51252d77cd787199366bd01331423e3883a4b4b428c8da33aa72372e3e38249b952cb114acb97cd89ed5a01eb2de5569b846ac57617257a1c48f673ab073b552049
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd