Analysis
-
max time kernel
600s -
max time network
567s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 06:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://caraachoa.com
Resource
win10v2004-20240226-en
General
-
Target
http://caraachoa.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543535567853021" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 980 chrome.exe 980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1940 2504 chrome.exe 88 PID 2504 wrote to memory of 1940 2504 chrome.exe 88 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 1184 2504 chrome.exe 90 PID 2504 wrote to memory of 4948 2504 chrome.exe 91 PID 2504 wrote to memory of 4948 2504 chrome.exe 91 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92 PID 2504 wrote to memory of 4616 2504 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://caraachoa.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe5bb9758,0x7fffe5bb9768,0x7fffe5bb97782⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:82⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4028 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3128 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3932 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2648 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3992 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4992 --field-trial-handle=1816,i,15093256065588032405,17626225763870366741,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9461c17da0d347f6e49f044602c410c
SHA1e7245f3f4b11fe817b2ec59b278bbd06872ef7dd
SHA256dbadb984fd8a9eb95c8e82669ca20bc5f6d64fb1de8811f5964bfa3601b736d7
SHA5120771af5fdf13c51ab390b24fae5d44ca152179caf2866975068296125f555257b4f68cdbf85b639081a1369daa6530c5d3dffe74abd0488b8f0136176070a70a
-
Filesize
6KB
MD56cad1e3fa3799e2a9f9cf1685059ef37
SHA1ea3fbfcdacaf0439984913d44e747155474231af
SHA2565b9eb2f62b2622b6e32b4a3aab9881372a844771795f0026ec9af442ac62c26e
SHA512dcfe3f584f298f90c750ebfde4173cc98521d5c028be585b91d3b25ff78d5e26dda8feb121edb12c969c4128b8cf883ffabf30ab9642c47ac889cf9c8b08949b
-
Filesize
6KB
MD5cea72cc91b4e1e0d8c7161da2c84b278
SHA1d05d29824fddfaee7d8203ec96e99cd81761ecd5
SHA25675b97ef12d9a5453fd1a76185264c1c21f07b3ad61f83e34828eedee3a34a19d
SHA512306dae0a74c2337a23ecfc0e545c8a8b4990c8ab6eab82826b75c3c88cd3a5d87708e403a77620d599c84b1a6e167285d9d9f92d97f0479f07090579b0d73601
-
Filesize
128KB
MD586ed25a3ccb09799baaa25ac8e8dbcdf
SHA169e8d53a339a6829b086a36d75ca0ca2a1a82f73
SHA2566a796cadeff54afd1cdd7192fd885563909fc69786a8c1c2cf5d1e2b95ad6261
SHA51245aa6d2e98988d8b278a95326bba134b8a3f5b5efd00001a34790b81e801f53e45a491a59ac92663f3161699665be824e0b976e44fc2eb68742ec04d4a802a9a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd