Analysis
-
max time kernel
300s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 14:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://recargas-moviles.net/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://recargas-moviles.net/
Resource
win10v2004-20231215-en
General
-
Target
https://recargas-moviles.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504934961985952" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3196 chrome.exe 3196 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3196 chrome.exe 3196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe Token: SeShutdownPrivilege 3196 chrome.exe Token: SeCreatePagefilePrivilege 3196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe 3196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 5116 3196 chrome.exe 84 PID 3196 wrote to memory of 5116 3196 chrome.exe 84 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 560 3196 chrome.exe 87 PID 3196 wrote to memory of 744 3196 chrome.exe 88 PID 3196 wrote to memory of 744 3196 chrome.exe 88 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89 PID 3196 wrote to memory of 4860 3196 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://recargas-moviles.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc89b59758,0x7ffc89b59768,0x7ffc89b597782⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:22⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2460 --field-trial-handle=1848,i,4983247550975429987,2958156126186054624,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56b7de49d3eaa362a5b164717e69f7b9a
SHA1d8a3508b5e30b9fdbfe03335aa071ee66195343d
SHA256e218c7ce1b43eed7993f738f7a58a43f6dbe7f621686309e530d007c6ddbc0a3
SHA512e37d4fec172ab2132b817d47377623cf36c00ee2cec3c223013061b0746c16b23e210f102291f6aa96a7173ac35a283761fb44d8b5b26f05137da98d92817f0a
-
Filesize
1KB
MD5768545bed295fe263270575d791e8097
SHA1faa60b30e24d797c8dd765f4618477cb3e6d6a77
SHA256df88a7670bc095416cafb88066ba82a222aeba020fc2aaaffed091d60f8b1f42
SHA5124990e111cdc4c5f4068501f333c92fad74b103aee4fe75cecf29d7ef7d733a74de62230b48b94e4809d30e8d5e22576f1a048bde8e6cac25a3426e8282aaa70b
-
Filesize
1KB
MD59a2d49af3b21ada4c490b8c115c8ebeb
SHA1637222c352ea67bd0ed945999b7d990f194b6a68
SHA2569a493093d139e282ac46b2e5479ade16b94f520f0a59db806a6fd4e6871bd046
SHA512fd2c0c3bfe31c7f4aa234186439f8b3ecb9aa9a27e71ec71fe50de2204eb774248f20e9b3a2dcae2a9605782d66d1c68a1d586ed4e828730003130c6a1c4e1d1
-
Filesize
6KB
MD5bfbb70e7f71169f63c1781abf2df758d
SHA16bf14076ddc5206d148d10d6ddeb106c5a31902f
SHA25674fc23fdc9266bcfca33f0a0dd0064d3be82c38315e5768ca7ba489f029370ac
SHA5123f33e07a3cefaefdfc9d6a72cf86745d33875d3493fd555cff7ed51dd8ef3fc6c2cda85b5e21686a5dffd49af811fe76dc3b680887f8fd5c5a37a75fa143caf3
-
Filesize
6KB
MD5d504472bad64d42ed6d21afd862ee9f4
SHA1fe9743718d4d8d032b6c74bf68954724c6f41a6d
SHA25670de375cf8387191cdaad08fcde4ece0b2f2b8a1a1426ac01553b736c33106b1
SHA512a0f30db29d36282a036c7925f7dec6a6b1554dfd6f66f41e748428c6a75a2e8c311c8d6e24d5c60f4deaf6844403fac18c210d965ad75f37249bd8c28a41c911
-
Filesize
6KB
MD52167382e9851d51c0273e0fc168de091
SHA150797b75d9d24cbcbfe32d46335350bdee3063de
SHA256eea09b7e12039d00bd6ba125fa53bda70be3673f0437372ebe9a6a52dd67de01
SHA512cd8b6b9bffe21e0fca7e825fdc496fc7d2b0bcc7914138b96ea2e6a4e7d74596ca69097aab5086053138264820c5581f4355fe58657e796c86e362f0e8ac723d
-
Filesize
114KB
MD5801c38cba3254eb8d29e794c5c966cc9
SHA191382dc22205c75e853a52dab934b4042d2961b7
SHA25690f22648c7611027770424ed3833861ee1bf80bdba9956b741f1b90a2700f592
SHA512e8af9653ca935a88d907877cdc055f27b2d0b77fa60b024ad7b3b73de35f191a1a29fd9d9b31ffda7a1f0a659f649a0c1cf6487f60f6c040ca1180ee27132010
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd