Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2024, 12:23
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.lahar.com.br/email-marketing/descadastrar/MTY3MQ==/YjJtaWRpYWRpZ2l0YWxfODMz/MQ==/Mjk2MDk=/ZGVuaXNlLmJyaXRvQHNvZGV4by5jb20=/b3B0b3V0X2xpc3Rhc19lbWFpbA==/QVBQTEFIQVI=
Resource
win11-20240221-en
General
-
Target
https://app.lahar.com.br/email-marketing/descadastrar/MTY3MQ==/YjJtaWRpYWRpZ2l0YWxfODMz/MQ==/Mjk2MDk=/ZGVuaXNlLmJyaXRvQHNvZGV4by5jb20=/b3B0b3V0X2xpc3Rhc19lbWFpbA==/QVBQTEFIQVI=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559294477679869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2376 chrome.exe 2376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3924 2088 chrome.exe 77 PID 2088 wrote to memory of 3924 2088 chrome.exe 77 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 3616 2088 chrome.exe 79 PID 2088 wrote to memory of 1704 2088 chrome.exe 80 PID 2088 wrote to memory of 1704 2088 chrome.exe 80 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81 PID 2088 wrote to memory of 1176 2088 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.lahar.com.br/email-marketing/descadastrar/MTY3MQ==/YjJtaWRpYWRpZ2l0YWxfODMz/MQ==/Mjk2MDk=/ZGVuaXNlLmJyaXRvQHNvZGV4by5jb20=/b3B0b3V0X2xpc3Rhc19lbWFpbA==/QVBQTEFIQVI=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffabda9758,0x7fffabda9768,0x7fffabda97782⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:22⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 --field-trial-handle=1788,i,16009683395517360791,16796021643840160985,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD570c1221cb6726f1f83b661084b7c304e
SHA11330b625491489259961048fd99a7addb00c9fa4
SHA2569396bf51451e0d1964599523d76a3d436c7259571bd40c4dbca690e92636573b
SHA5123b37e7064260df4b9e8123460505e79fc1fdc1fea96ab0c4c0c144ecfff7733d4b980300fb1f594fcd161522d039ca1a30b8ff0241e5be5075abbcd24c21be56
-
Filesize
2KB
MD587757aa2014bf4e792f01f1a400d0012
SHA14b20071e6752dfc75ea2a14d6dddf281332cdeff
SHA25614b65f4e0fe0880c1e93b7112ad6021b8931747d46c1bcb19dacfedab77f050c
SHA512840580675c2467db2ae815b2497d13b41f6c8ab5a77b9a56406c67b0031f85269322d86ce9af7cbceb4b8420bd537914691afa4574843cc2c6f058b9c78cae51
-
Filesize
1KB
MD50479a6a0f7817a10d1b7de3f34851c1a
SHA1d3cc1b20b32eea7cfe790ed4e563fa8cb58bd326
SHA2561ce5e21e8471015bbbed707dced9252c8ab44968fdc97c3e6408c252a498f885
SHA51219adc96fd5eeeafdde23ca7a2b7c09cc17560e4b872bc452f6c57b2180f0a8e2e6e9f16e1ec6f8158ad896509298384965ef6fe65d29a7d20b9b23e2dbe0b492
-
Filesize
6KB
MD5203596503dd26c4c546d445e5d4688ae
SHA121c2d1430624768b2bc7074cf0017506f935ba67
SHA2563a73642df2d0c3c594accb56b7ec87f5d1daa46a09c2f136e09733d356f62b58
SHA512100347d978e1ab93545ea6c91f4932fd2c27c3489eab3b237df194fdd16c620206672ec0d011a455f8903662137ac079d6b0c5cde7e9867712730f644fa48c96
-
Filesize
130KB
MD50ab45a59c0cdf2b2f7ac8c53eccbc03d
SHA19b51bf2ffe99a0ddc868615ba75b9b7665ba56f2
SHA256ceb6d99312fd732ffb9be3eb79177ce9ae34fef922136aa7c5640f6e22e5f448
SHA512c8c9e407c3fb98eecefae2e73f1901b8cbae0e3fc4f29118f25a2267a79425d24bb2abfdc6934423eb6a09b93e1920c132319dc361b30ab947ecfb9cedecd7d5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd