Analysis
-
max time kernel
300s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 21:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://54evuwhv.forms.app/solicitud-informe-reclamos-internacionales-midinero-
Resource
win10v2004-20231215-en
General
-
Target
https://54evuwhv.forms.app/solicitud-informe-reclamos-internacionales-midinero-
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133550114039471012" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2900 1736 chrome.exe 85 PID 1736 wrote to memory of 2900 1736 chrome.exe 85 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 444 1736 chrome.exe 87 PID 1736 wrote to memory of 3908 1736 chrome.exe 88 PID 1736 wrote to memory of 3908 1736 chrome.exe 88 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89 PID 1736 wrote to memory of 4196 1736 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://54evuwhv.forms.app/solicitud-informe-reclamos-internacionales-midinero-1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe36d19758,0x7ffe36d19768,0x7ffe36d197782⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:22⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4772 --field-trial-handle=1904,i,14682618942658211197,2383562675037805915,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc353153195e8d24bbcac92894ffb9fd
SHA1d7147b2907834375730fd9ebc6b03d87326bf789
SHA2564c0c2069d20e48f1aaca89bdc8a0920f06073e69600c56376d6ae4540b590546
SHA5120248e0bfd52205f9352ed886565ba5aeeccc44a152d8a0a270fb95120bbe8ef7ded15fc04a17f4a26a6e5fa95d45f22aaf84115d3112ce2326455d988bb65e0f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\9340f8d2-ce73-4b72-b1e9-55a699a19410.tmp
Filesize2KB
MD5093667277a2053300e4700eea3ec0c2b
SHA1aab5f1bf79597cbc87698966dbd21030f9356152
SHA2567e6a6d749d9e9cc57605fd1cf57443c2d9b371ee8981785a145d8d7917fd2938
SHA5128db3b2b3fe6a74d55ccf18e0216de22b3ca61004223fd5f96c57832b234c76c9acb1ef9d9f1f3cc129b08cf112ebcdfb9125e415363c5cbdb5b459f704d4894a
-
Filesize
2KB
MD5142d74ea35d20856bfe3c5c65445f03e
SHA1b0b360d7a7563913113cb6bb960208258c280283
SHA2567722010d2bbddf48429220c5d69196e872ad41ce680aec68077236bb36f13206
SHA5120bb6578fff03cf84d83be34e075c6f325b5da295f2dd7f97adb0b7cb6ba1e5ee4bbed676b8a796229568d449098cb6a4b0c35e8b9703eea674178ac8385b8612
-
Filesize
2KB
MD5b16e2befaef95054dda007fddcc42bbf
SHA137cdb0426c4cfd4abce4f9943efc6da37fa49313
SHA256a72885e70076ff693f4270e10a3c29863c0040e5ec98e86c5ce776b895b09c83
SHA5127b1b94861d1ffb7f2a300924cae990e2a1018cb216bb14ae2f8f5ec7266e958096b9f5ff407d0e202a18fcba29c7c848b38ab66913a187840adc29ddb9634a5a
-
Filesize
2KB
MD5612d22fc615c357f92af1004cbfb8ed0
SHA12247de0f358b2abd48556a13369057fc3f20fb73
SHA256cba461eda088bc80e2b1e19c1a80a092be5a2d21303e1fd923f80d78215303a5
SHA512361f665f231e17297af4f306d5b3166ddbde64df906e6f8196b3284d287ea7f855357ff848912a64931dad411838b2186325b16fa05d51359040c5a65a5e841f
-
Filesize
1KB
MD565e8564cc03d883c48f0c63d4d728bd3
SHA15c3cff8d4cd317f3547923d9e4cf7b4eeba1425b
SHA256bb3a473ac3cb8f51c9a07a6dc9d9c5f6305aee1da51dfd784d60c238dcbf5ac3
SHA512821de341c2d6e0344c649229ab8158c06221f874f221596e158356310f10a12a7494cccb6378a293cbc86595b99171656dcd41449238e661d740ae68cd275052
-
Filesize
1KB
MD59800e94cbe56bcdb5415e110b125e9b7
SHA1bee6a80698f49cb65e13ae1a1e16a8cd88c2171b
SHA2568205d5f1753957781126547e184dcb2917700b19e4104ac439d375b34a806460
SHA512541fcd347d9e03880189239b7ac0c0f5856af65de429e07f6809b131a83e2205d6b3b46617b791049ba8e7781d740962bf5ec5899e6dbc7022ee06a0f6f566d4
-
Filesize
1KB
MD52a7d2c19946cd5f7454fb6a6109212bb
SHA12aae757e11d2aab05e3ac028f1556acca03d9be9
SHA2561a46479e3edb0e647bd5cdee9d949d7add55fb417196623315c8324d3a039b7d
SHA5125fc744ce318408cc2c781879f1eec6e3853f5e4334191e73760d0bbab750d825c642a6fd18ed8af5d9300712e136962db1712a256f6a0668ab5b5766c6387aa2
-
Filesize
6KB
MD56cc4242f0160d71b3d86ca08f0bfcbeb
SHA1bdfa0d82d8c585c94334471d68b0575d8a25dd46
SHA25664d76fda36764f1031363c47fd38e69635e828123fb89e595b415560079d4d1b
SHA5125b54175610f2c6e46ac9951258f50c6773e0a714fffa412fed8f59396fb0e939ea50b245167723da78ae5bad1f5e26ee5ce6d473288e4d3c5b7a0e0a3535620f
-
Filesize
6KB
MD59512d9e6a07dfc049b2566237ac98346
SHA12bf605090c163bd84382cf16bd0576f41fd7928e
SHA256f8eb25fc35f49d3f559524fc6ddc0ef9a8973e175c7797a38257fa408b320bd9
SHA5122384de3c08c5694bd246352bec7341e6a423c50b4faecb7c0a074f0cbe57e5591cca6ee595ff255250cda1e79eaa93d0d5e25a47d34b173354af8f988995082f
-
Filesize
114KB
MD5388c96d1558a6f1f47ffed32fe84d9c4
SHA1bc13278a320fa5e812a770779d2b1dab12ed14bd
SHA25696e27e2808e3c0bceb149316e56d442b2d2cc57886e32e953158e9088dfeaebd
SHA51258199a357e3214218e011a37b766cf59610a5acae9922a11dea36058c50d134ba3030027391758969cdca56bf58718c46ff4e29b4c0580f237c092150a83907a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd