Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-es -
resource tags
arch:x64arch:x86image:win10v2004-20231222-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-01-2024 10:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.www.www.www.www.gbancomediolanum.trabajo.yalecarolinas.com/
Resource
win7-20231215-es
Behavioral task
behavioral2
Sample
https://www.www.www.www.www.gbancomediolanum.trabajo.yalecarolinas.com/
Resource
win10v2004-20231222-es
General
-
Target
https://www.www.www.www.www.gbancomediolanum.trabajo.yalecarolinas.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495285470380359" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 5376 chrome.exe 5376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4528 1784 chrome.exe 86 PID 1784 wrote to memory of 4528 1784 chrome.exe 86 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 5836 1784 chrome.exe 92 PID 1784 wrote to memory of 3148 1784 chrome.exe 88 PID 1784 wrote to memory of 3148 1784 chrome.exe 88 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89 PID 1784 wrote to memory of 4992 1784 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.www.www.www.www.gbancomediolanum.trabajo.yalecarolinas.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc505d9758,0x7ffc505d9768,0x7ffc505d97782⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1860 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:22⤵PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4836 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 --field-trial-handle=1932,i,18221158467585806661,5748397217308712856,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b9860f6313a1e106e4185ceb1fc7b626
SHA17fc1cfc8c43c7fb02b8d09822dd0924ef93324de
SHA256f277f95a96f6563d97027cf615f75603becbfbd4d36dc6536fea91f919fddecb
SHA512fbe7650b9027ef21aa0586c81300761f9235faf2eb6c3607178ee9d28366309541296da993c206c16f9966cc723b5e091291df5510a3d22572824ad6b6020501
-
Filesize
6KB
MD5522ad77501feb9134e3372bb15878230
SHA1aebaa970555fcf982e8aef90f6afcc563b89e87d
SHA256614102d855d250a3d75c35cd47f28289b53f13a46d0b58fc79d8e87deaa7ddb3
SHA512afa7a58ba6bf39ea57ea79b50ca711d5d4484741a396f0b2e9645d574d0eb4f6ac84a4e9016d7613e93fc150eacb80794e847e641bdd2b7b53754d5f59c04d44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b13e3557-6400-453a-9bee-b161acfe8bb8.tmp
Filesize6KB
MD533b3aa031ba1f57e54f86d503e31a00f
SHA100f427e1984ee9df556202aaa1041116024038f2
SHA2561359ebc4e6b2abdce21db2fda867efff1f05c90b7282452d406680b8efe83618
SHA5127fedb8832e01cfa4989dd7eedddc0a724c2987f1d1cd25fdd070bb0035e0916d01a43a68788615b2b467a9c36af1b0a880dd102a1321376012efc744000aa8f0
-
Filesize
114KB
MD51b21b6f8ff946956d1ff2497deffec2a
SHA1e6e6629daa881f759068568b59c66ac9b9ae3d49
SHA256d9c07bd32455e47350bd71cf4a0ed910cc949b414fac43015682b697b5c6e1c6
SHA51217f432276337a6b976922f00d8925bbc0a5505ddcbbf74d9842e720d0afa45b2dc944edc740a005bccd75997e2e9c14746259448b1620039e10658c63f48b12c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd