Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 00:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://netcabo-pt.com
Resource
win10v2004-20240226-en
General
-
Target
http://netcabo-pt.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541588708497605" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2404 chrome.exe 2404 chrome.exe 6044 chrome.exe 6044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe Token: SeShutdownPrivilege 2404 chrome.exe Token: SeCreatePagefilePrivilege 2404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe 2404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 5048 2404 chrome.exe 89 PID 2404 wrote to memory of 5048 2404 chrome.exe 89 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 4944 2404 chrome.exe 92 PID 2404 wrote to memory of 3156 2404 chrome.exe 93 PID 2404 wrote to memory of 3156 2404 chrome.exe 93 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94 PID 2404 wrote to memory of 2164 2404 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://netcabo-pt.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa29909758,0x7ffa29909768,0x7ffa299097782⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:22⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1872 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3080 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3680 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1756 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1832 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:12⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=892 --field-trial-handle=1920,i,17611010372855845400,2101039077012232210,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51eb86e75c814a2dd6c8b17db46187a68
SHA19c1b73898053b843dd9a9d85a1ac708b8349b9cd
SHA256a2b72b3419a118e2100e4f4a7b4f54d5944cba49960df53f0e57ba39bb55b615
SHA5129409bb34f51de46a7e2660eaa8b9d75cf3248f7cb0793bb38de974a559c15e46259b255a993495ec58a774cc3a41e81b58ad1ed78b0c0c419608c2835cf4d4d3
-
Filesize
6KB
MD5744ebdd76613ca24175e58a6ca84f3a5
SHA121123c182b98d41840108f62a23c99d790c8bcf1
SHA25637d82d4432ec94e32f80685fd6c0ed1b82c1f6b779e0607e51579c6296e08463
SHA51297b0ad4a8dd50faac9dad49bc1cf78d839063d49e83936e1d7dde56f77ec8ef56f884899f7adb294391d82f1c6ee1a7bba4e2aee8bc023e96862b96b350307dc
-
Filesize
128KB
MD57b1e12916ebb92d8df713cdf9a9e1106
SHA1e61eea9f8deb7181f8d0a7c2a6556374f9a4355b
SHA2562977a1aaf165dd66a0fcb833d8c43bc58e86d8a89db0ccd05a198ac20815b1e8
SHA5123762fb8cba08f7b516079c7624a4f8d358af40733fce9db8b5e9f2a7c765ac15eb33102f77795064129dbe62dadc243bd0190ae79982b06906925811856799f3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd