Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02/02/2024, 00:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.economia.unam.mx/cechimex/index.php/es/conferencias
Resource
win10-20231215-en
General
-
Target
http://www.economia.unam.mx/cechimex/index.php/es/conferencias
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513059579048738" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1484 chrome.exe 1484 chrome.exe 1576 chrome.exe 1576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1484 chrome.exe 1484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe Token: SeShutdownPrivilege 1484 chrome.exe Token: SeCreatePagefilePrivilege 1484 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe 1484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4036 1484 chrome.exe 73 PID 1484 wrote to memory of 4036 1484 chrome.exe 73 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 3052 1484 chrome.exe 77 PID 1484 wrote to memory of 1084 1484 chrome.exe 76 PID 1484 wrote to memory of 1084 1484 chrome.exe 76 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75 PID 1484 wrote to memory of 4608 1484 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.economia.unam.mx/cechimex/index.php/es/conferencias1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb51e79758,0x7ffb51e79768,0x7ffb51e797782⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:22⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2644 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2636 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3680 --field-trial-handle=1824,i,12392981810863707723,15947545652979571346,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5f3b1f93d11afd5a2b53ed6d7a3c5b929
SHA1d42f2f664d6a340c7e466b3801567ff7f022613f
SHA256351db65c712c5ff211fab6a52a55b2af59afad8c9ab3fd8a7e05343b1b04f8f0
SHA51213f82300358a4d1b78a08e20f54e0bb173b9b8794dca03e827a0f63405dd4303a46c4006203083d2666b57a2352c7f60097cff1b169bfe1a1161fbaa94180c66
-
Filesize
1KB
MD58b384e9c1264d454f661cd8fdff73621
SHA1744fd677c78d74b1cca8e7033ac9cfaab2937b9c
SHA2563f1335e73b3a84324e46fe16ec49e9de5524b315ef2abe14f9ed39f0d324e56e
SHA512431dd2307cea16515c07fbb86f3aee4dd80ff7a342274b652d46b68c4a2183570d72ba53ce51840c0845d9dad0a7317d3e7e2fd5ae6da15ca3e63c15876c6ac0
-
Filesize
538B
MD56d44f6b97558ab3bd8aedac84293b2ef
SHA1032c9f583cb7df53e53e6e4075a17c3109cd30c3
SHA256052cdbc33ab88161c5b151597a248244a3054be627e6ef2bc0f7af76c312c0e8
SHA5125de475096807c23f7d4b47104ebdcecfae32ed54c690ea9679940e5d02621f382efa17592d696140055f12f939722fcf73d763b2bc55464c30993973d321daf3
-
Filesize
6KB
MD530f54ee8f60077b2e12502df05edfe09
SHA1fc64c5b1f71476895b58536e7f1e8acb4f67cce0
SHA256d9512d2456d6763b907da8412b882ca4dccf07a00563d848c22e27181372443c
SHA512e95cccd6eae37bd98a52ee6ece9bb3adcce6a9d09676b28f84f6d509d19ce661d6105687557059f3cc4e8046e660beced9ad5553a5af8329111078f8321c2df9
-
Filesize
5KB
MD53c1230397bea0dc35ea4c377981849f0
SHA1b6ca7d5f3ca3f55ff958e6fa00ee103c6b6ab9f6
SHA256b419b6ef9f05276e16fe1dd86c2cb1b1dbbf19f517abd44a24e30810b75bfdab
SHA51208368dabab994484f99772feeb1c523420564d13e82865e04552ed3dc7d537a42c340c58ae04e60a5abcfd9d11acaa5214dfd52218cd2cbb7291edf38be94286
-
Filesize
5KB
MD51cb8f7a924e2962513bcea13d5880290
SHA1d0de8acafaf3f8a1396c208ca4e16c1d8c79333f
SHA25657f440ef0126e0fcccf8b1ac5658ad8b3f6fb4d0096154698af58074eea21864
SHA51209dc324e976e494fc9ce0a7e4d80f3ec8d0979d5304419d9010e00b3b682e32d84affa9e40a4170e5e7dd097e95670c353074e067a1167981225d85801c60c1b
-
Filesize
6KB
MD5d45b938677e5273493a820913e1bacd3
SHA14c28e6c832a0998b729cf72b7282c832983bf4ba
SHA256fc640e1b646c647df3ae9c2fb736b926b6358e01ab50457d4102cce606c527db
SHA5124c16db21ba018bd70de84b96b6ff3de5033ad2db861ba9ec441da5e8731827a69b6693e2daa6d20049c6427064a8fa8d7776a2276593852ce51dea23847a35f2
-
Filesize
114KB
MD531f247fa34301489b556cf6290f46dc3
SHA1449e4390a2e77785aeaedecb811516fe6698f957
SHA2561249498a99edd2a00717cb9d0c6c2405fa3b628ce46deeede95f37b01e58f4bd
SHA5129a639af4cb893a22f93cf9c9f4531a09c2f3b5abf4cf343a7583e4aac6b7b53a8949270cde6b3cd0c62184087c38e901ca61e1736dff65007defd6baae219d52
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd