Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 19:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://home.kuehne-nagel.com/documents/1076522/3216141/Brazil-Info.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://home.kuehne-nagel.com/documents/1076522/3216141/Brazil-Info.zip
Resource
win10v2004-20231222-en
General
-
Target
https://home.kuehne-nagel.com/documents/1076522/3216141/Brazil-Info.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513760477470587" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 4532 4972 chrome.exe 91 PID 4972 wrote to memory of 5068 4972 chrome.exe 95 PID 4972 wrote to memory of 5068 4972 chrome.exe 95 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92 PID 4972 wrote to memory of 3812 4972 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://home.kuehne-nagel.com/documents/1076522/3216141/Brazil-Info.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0db39758,0x7ffa0db39768,0x7ffa0db397782⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 --field-trial-handle=1860,i,584051404943890220,13167977007232674944,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
903B
MD5ef46e171d71ed01d166707b890050c98
SHA11ace0f680bdcf577e8a225ee36a4a2c223bd8da5
SHA25692d28b886504d5b80316a00a38351a521e9a339e31a4a848870acc3c10f1fcbc
SHA512883b874a8a77cc820ee429324598882ebf52d40decb79640f7cac7a3fe6feec67b400af05d2ca84fd9974923412d2fc46c03466f5551d740ff3b7532742ab1c8
-
Filesize
538B
MD589fdaeab80db86c6ca5a8e699346c7e2
SHA1cdf5f95740f4fe56060f53bdc432e3463e6a46e8
SHA25600393e15ee6b0cbba7a4cb80c0408ab47b4f27d56fe187262bdb7386b689baad
SHA512cd5b0be091c1861b1549fd1aea9939fa0b1d0212b56c9b63652678f21ac0908ce6c4a86ba0f9b74d9df2ac4c9738b135d90c4c113e170bcb51fd62be6f401082
-
Filesize
6KB
MD55a242c48210f5f9746fb8bcad5dbf657
SHA1f2bc69f732aa83b4bcfca18465814c81a554eb3a
SHA2566324ffb281c76cdf484a056464436510454c89fc3b067b1a15a46950d31f42a7
SHA5125b68ac15331d113748b8ca35123ce5860f17000f146a691d130b383d829ef3dcc3bb90004ed419aba415ec0dd92ce6566bd6738008c8cb37ffc862126607e442
-
Filesize
6KB
MD541b9a774ee6ac4bdffe3675758e4742f
SHA15045ca4fa4f9d26fb233283a22cbc98cc5cc4f4b
SHA256da6010c8142c5a8fec2abae2de2c7ce3eb8691d6dac71d95d013995f6a17a87d
SHA512fa4b49b4f0571a75db45c5059b4c5153f5c9b28e5c5509c7ef13caa3ff595f78af38d5a5d4b0767f2a23951d49b5ea38c4fdb396b9888fa62f0439650a295875
-
Filesize
114KB
MD5393601335c2c8a2e925080968a817a7b
SHA1a6028da260635551b987a9dc16432bc294551e1b
SHA2560aa1517e769f79df1085408d70737b5d73ca699d7bde8997c50cb0e11b4087b3
SHA51258c6978b0ec444d403d77e7385e5f1f1faefc80cd1be7a1d06b013c41483d31f70a9c60833aa6b14aa3def7b6042b78d4e730d9953a8a9cf4c62ff7eac9b6aca
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd