Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 10:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.mpineiro.com
Resource
win10v2004-20231215-en
General
-
Target
http://www.mpineiro.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528970106328896" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 388 chrome.exe 388 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 1996 388 chrome.exe 83 PID 388 wrote to memory of 1996 388 chrome.exe 83 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2944 388 chrome.exe 85 PID 388 wrote to memory of 2596 388 chrome.exe 86 PID 388 wrote to memory of 2596 388 chrome.exe 86 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87 PID 388 wrote to memory of 4940 388 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.mpineiro.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe1a139758,0x7ffe1a139768,0x7ffe1a1397782⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:22⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2848 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4736 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3972 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2528 --field-trial-handle=1904,i,12793235073625265728,13740496222992670034,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2104
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x42c1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
114KB
MD5616da05f55b91fb155c802cf52211ae9
SHA1277f89afb74cc5d2021ef84d923167707c73bd43
SHA256d1cba0192c5e3d749bd44174ba143e5594ea6d072f226836a2a2d3c66271e9f9
SHA5128b8bbf5cefbb1fc987fb05445d1fb6c5acdc30994b169b0d9ac7216cebff5a8aa8f4eca212b17940708a895ff214c103c71e5cc14ef38be4b2e4df4cfece28a5
-
Filesize
212KB
MD550df70eee6ce231973d8ee17dcd61ac9
SHA1477a0834e16f535bf4792f5a1beb19a5bb36575b
SHA2565d4070dc9d9532e6b56c740faa02dff21168d51fbacbf438e268cc772ef07815
SHA5126172ac0ffa3194ceefe91ec07bc720a06ccec8f071d70a208169e88b0a94c3f5112afa6b01cbd436e3d64d0a12a7ea1b3316068c09c98c22ef58a587ce972487
-
Filesize
792B
MD54d8b644ae67734012c4a3768553293c4
SHA15852894b81bc84e713c5518f87600e3bf7bc74f6
SHA2569640f60d401d44258626a708b5249c917db5973fb5ea245260a080393d52a4cb
SHA51227f187054a9e6c351e8a7d3d8a6248da7b475960b1ab082cf4c50bfdec77456ecd57443822cde2d15faa5c15a8c998d6b72c20d7525e41840ce1b30bb4b135f1
-
Filesize
504B
MD5fa7bbc95a489e910723fe5f6929c2f77
SHA14fe85c08e53e1e1d42d561b1f97573b0b0fe7d54
SHA25624089cd2055d414d8cc824d56b93550bce230cfad49fbc1c0764de5dfff05953
SHA512a797f4e79390594cc78a16ac9917b66b5dad7cc563a1b99efbcdc9f285520ffc20f33f46b6c5c7ae43d08e31de005dde1c4bd20fb8a3e88ff933ad936f409083
-
Filesize
2KB
MD50ce6de798103776399db54060124af80
SHA1f3f747e4e9d06c36924e6370821570d6f8d4eedb
SHA256424751456ce7d10c82ce1997af7b0577978ff063462b61a4fe6b367ed4bdaa59
SHA5127e0d837cd827c8a07709ab08b1e433142a80b56ef02ab5c76714947097bc2e8cac8e0dfcbb993a4fcddeeb8c829891b3e21ba1382cd369392d21729f80adb4f6
-
Filesize
704B
MD541a39e9c3a42df2de464b6563e9c923d
SHA1c1834c735ba88fb21e4efc49a13bf7408cf3bc40
SHA2564598cc354291d8eff640058b73cf05e1f01d3a701f535e60cc326648b4f1719b
SHA5127dca52b439c06083685955f4a7c1446131e757dda46db057ba710dda819468345bd8c38b4c2063de837937857b9e695b7e5c4077d7aa86a7c00aded9e5be0d03
-
Filesize
871B
MD5705afdf33e375f99359e81a5387df5f6
SHA17f83454aa6ca7b9ecc9cd694273d90b2d48355cc
SHA256ac243f31f701dfd94a39216056683ce176f2c67873dd1f168014d2c6d678b750
SHA5120ef530a17aaf1776b7c4325ef0bb8e5dc35f65cfa79b3ef427831e66a3841d25c47dd744e48c309a0b2d25766d90b1cda4031214da31946b147c3aa6626ed0db
-
Filesize
6KB
MD5ef478b7f159987781ccc76c34a10b43b
SHA11268e763b0c7621576002384fab223b526ff67ca
SHA2564e9708587439aedbf20ebe175b36ff6605f709726d24e5c1d401049b465ec075
SHA5124ec229eebb21eae91ca8eef2ae465c1f1bec64699a71325db611858c27a31d69e357e902d5999624479f665b859b5ca5309ba76e0339c987404abf6457f33c42
-
Filesize
6KB
MD5eb85024c8989c4ce5c954e6bd51407cc
SHA17205a57de13c9e526b9f678dec036d20f6759dd2
SHA25676d8d0edd2cc4e2eccb54ca579c007490d9a3086cde45f68b5c85076a7a85455
SHA512bb0b863bdc516425c2b21e1e2d7765fc9dbefc91edb867a8787aa59b23ee2a225d2f79e3370e49e900d9c7dcecaf846eb7b837feec2857f13d2d8a1a9d7069e6
-
Filesize
5KB
MD53a98fb2b74683d7dbe8924467ccaa57d
SHA12fa2ba5547fa1873228f89bab8c7b5b9356cc90d
SHA2569414e4c28c57d31bb55bcfb7c92717cb9ec91e4cf085bb09f13e856600a402be
SHA512e100feda39a26b9165c1b41a4242e57d3e240853e6f7961067da96225e8c162e9d6729698305d5ce2746f7028db5e07ed961adc40e0f02991ac1a04749f73e63
-
Filesize
6KB
MD50045ec8612d30f862f510a1d6c88423a
SHA1e6b34ba77b910e40daea38e3e412929abbace24d
SHA25666fe92277df27e2e3acf9e3e4cca0ab92eef2a519596ef6335b684b49f93a288
SHA5124a7d2ce0ac59ab7d94175ddc057b7dd80b7296dcc2ba3f81a666ab2ef7f6749dcce8553d4d9ad845a06af75d6fabbe0cac19456b5097db9c0f95297f7e802214