Analysis
-
max time kernel
46s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
04/02/2024, 19:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dev-verificar-iniciocxz.pantheonsite.io/
Resource
win10v2004-20231215-es
General
-
Target
https://dev-verificar-iniciocxz.pantheonsite.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133515498415398419" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4088 1356 chrome.exe 85 PID 1356 wrote to memory of 4088 1356 chrome.exe 85 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 1548 1356 chrome.exe 87 PID 1356 wrote to memory of 3628 1356 chrome.exe 88 PID 1356 wrote to memory of 3628 1356 chrome.exe 88 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89 PID 1356 wrote to memory of 3572 1356 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dev-verificar-iniciocxz.pantheonsite.io/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa95b89758,0x7ffa95b89768,0x7ffa95b897782⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:22⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5168 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5468 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5584 --field-trial-handle=1892,i,5984781963845702514,15595293095269757548,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD57fe2c36271aa8065b034ce9efdbd2a07
SHA1e22ee654cb122d0d62393dd8d6753d2bcad148a3
SHA25602cf672988303d8fbdbc7625f54596ece6d83c78152ca6e1aa332fc8c75d5c34
SHA51245d53a09ced29138e2f99e0e8a293322050f8032e006df06315ac9af2f1ab64d1c767ea5db53289bb5881a4866061299e5a60cd83753fe6ba88e8de7562706ec
-
Filesize
480B
MD570d30c532712b08af79527ddb36f5f90
SHA14213a40af9dc6d56ac4b4b25fdd2983dd17b056b
SHA2564a3754e3bbf68bd26848ac5911cc8008b5aee0472845ae12e82b4f884d713fce
SHA512548b10178383b3c654760a621f05ac4257fdd5b6affc4b9a5644fd5e2a575be6840e4e738701364e8f3097cdb3199fef1646eb86c91306462ca6232d29abb6ce
-
Filesize
874B
MD5d3a6ef0a275859cac9d4963a897ecb06
SHA1473bc7457f0f41906db2fc3e9ab46a5786a00b0f
SHA256151ae6402149b4b9613f7eacb5311cbbe1a91ab2ea00df6d81adb8ec78f8cf81
SHA51257006f5eea83c010b684b9c6a881e6a9c4d9c688b6676cfd6fa9e556ec2e60de85fcd3ee03d4e9c25d90e96999189daff587cffa5f3df06a369c8f07dd79aa62
-
Filesize
1KB
MD5ef17710299854fc0ce30fcf60e6ef229
SHA151ee8e9e4da14f5bb6da0216f8884671eb366ed3
SHA256623449d32e16aaf711aca537ceb211d2563472eeca64004d152f07ebac744c11
SHA512ee701d3821245520213ff5e0a975ebf665013baa44986105bc9f5f163d965891c747f31d698caeddff476d2fb583930ef38624ca73b0676a022f42ffff8367fd
-
Filesize
6KB
MD58edb14fa9e90e1592cb20589004ac26d
SHA10c51aad21764be3c608c5dedef9e3d2fdf38bfbd
SHA256d3ecfb82b08aacfbacf4b233eb40e24d3740e707acc8dacfc6ffc11c2fc3db4b
SHA512011b941106c630ad26159fd29c04e419e970fab1e5e89137ecdfdb8b2ee4ef9ac3be94afa6c65f28bbfe89fc12e09c4e7e2b193a8826ebbe8799a55531b7c6ef
-
Filesize
114KB
MD5cf88f881c6edc29e88a53576241c94a3
SHA14c18e8849a58c61b34293d669e3a004ab6359869
SHA256f360491a23601b65ba85bdc77a1ce22c7f0c23def7639ba4c56e1b6b406840d6
SHA5122282b8718ff5f5719128a3d6ba55b9488a846cd1b6a367446024a11d95aa760a880846adfe35b16fdf1f9a651263b8812549522d60d7a2648c30a7a3835cc6f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd