Analysis
-
max time kernel
600s -
max time network
509s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 11:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hipogestion.es
Resource
win10v2004-20240226-en
General
-
Target
http://hipogestion.es
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547153614855017" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1432 chrome.exe 1432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4124 1464 chrome.exe 91 PID 1464 wrote to memory of 4124 1464 chrome.exe 91 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 3484 1464 chrome.exe 93 PID 1464 wrote to memory of 4412 1464 chrome.exe 94 PID 1464 wrote to memory of 4412 1464 chrome.exe 94 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95 PID 1464 wrote to memory of 3116 1464 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://hipogestion.es1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd409758,0x7ffabd409768,0x7ffabd4097782⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:22⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2696 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2704 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4920 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3944 --field-trial-handle=1852,i,5663396840904025984,43764978887626138,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5028
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD551d80b22ed5f695294a82c39e42afb94
SHA16d24aa3febb0b79a947be35839ef6661db21c679
SHA2561adc50c01ed1e1ca793edcc3c824ee707ea5ea1f59791222f3f917ac23d62fed
SHA512c52d906f70bfbda221ad6b95905d3bc4032438e824d002eb71ea90821c6945b472e67cad7148ac68778057a2f509fe95dd3b739734bebf7271b5fbb4ac4de93e
-
Filesize
1KB
MD5fe7dc3af5eef84e280a8a385848167ca
SHA15323311fff698cf28d118e4fb7573c4b6ae22753
SHA2561c7473ef02f76c0a6be54d66efa77cdff2622faa0fd06781ba7d2198a8c6db29
SHA512be0c4c4a8d6c6f8d342dc5b90f7f224130298cb2d52fa0f92bcffec1cfde4ada3475e982bb9ba0ef842a0d31c8962397462a9fdb2fa1747b6a80b04dc3f41fae
-
Filesize
1KB
MD528fcd0de3e679c91a45fc7cdeed6f094
SHA11242890d65e27d96d39823f45fac2a80fcc16c84
SHA256c3e189d3795c7a4115ef2a9829714e3af76546a373fe6283bd79d98f08d35f7a
SHA5123b48173f5ec6997fdb30cb1ae2df5f7f44317ce965e70cbe1a8264121f466c55ad5f35e061334056310c9f86f601b6d4aaaecfafe4d558ba232e06cb277dfd07
-
Filesize
6KB
MD508d5c18f4b63d091e42314032142c6bc
SHA15337c63d51f57a31e16975d9b31d6670bb6617f6
SHA2568110799b90c69ad5e647577a2ff498fdbd6cb540b3bc20df3daae91422d8c9b6
SHA512b87f77931d2608516acb247a1d93e3db087887eb8db04500e96f2346ac8a11b709abb75ea7085fbbcfb472e2a6fe69c92bcd390695d7b478899e1f6a40186454
-
Filesize
128KB
MD5deeb6eb26af8d5a1eb13f4d9ce1ae9ee
SHA1043b5511c79ccd827ecde18907a5f19950ce0127
SHA256c69203501be0513a2fa580b4b9000a7770abbddf4768e90ea4440210db7fbd9c
SHA512c9ea147c4a7cf5fcdb31333befec450579143add20cd4c501c5b96d8dd980991bc0f76e9c452eb99b70dcbb86cd98ce9205876d2252274ec9dd24ca0dd028238
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd