Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10/04/2024, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cluprfacturagitalcionroma.norwayeast.cloudapp.azure.com/?facdigital-web/ConsultaClaro.aspx?nroFactura=9203-22988292&tokenValue=3233d6e527ebc123acf78373d3f0edb4135e3992
Resource
win10v2004-20240226-es
General
-
Target
https://cluprfacturagitalcionroma.norwayeast.cloudapp.azure.com/?facdigital-web/ConsultaClaro.aspx?nroFactura=9203-22988292&tokenValue=3233d6e527ebc123acf78373d3f0edb4135e3992
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572341472847647" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 2424 chrome.exe 2424 chrome.exe 4548 chrome.exe 4548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 4988 2424 chrome.exe 93 PID 2424 wrote to memory of 4988 2424 chrome.exe 93 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 5044 2424 chrome.exe 96 PID 2424 wrote to memory of 932 2424 chrome.exe 97 PID 2424 wrote to memory of 932 2424 chrome.exe 97 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98 PID 2424 wrote to memory of 1580 2424 chrome.exe 98
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cluprfacturagitalcionroma.norwayeast.cloudapp.azure.com/?facdigital-web/ConsultaClaro.aspx?nroFactura=9203-22988292&tokenValue=3233d6e527ebc123acf78373d3f0edb4135e39921⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe9f9758,0x7ffdbe9f9768,0x7ffdbe9f97782⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:22⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:12⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4552 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3648 --field-trial-handle=1860,i,16167328903516835002,13263307549131750430,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3484 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6224 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5a56a5560b4300458151b4b3242b1fa4d
SHA187c595601efadcc433d6ec911dd481be6631f7f9
SHA2569298cb1c9a62835abe121e1a4272a7745a63346da9742308e80e898b54570ac2
SHA512e4197eb3ab3fdc3bb24628d3d645385c9f33d58029b67f5b4043edc383262ba274f1d288fef92609bc605dffea31a8fc22cb4c54630fdf22a407014ad9a921ba
-
Filesize
1KB
MD50010fdf5d6e0880781e994bf9b046d5a
SHA19c106aac1644d19c3161103a12d5221f3aaf46e6
SHA256852f590aace2a0190014a343233d06c822f3967e48e0022ffb208feac27ed5de
SHA5120d771968a5b93d02ab319dc699aedb76e70e88a6769761afafc2b078cf331b147ad9565ee2f75f9dd7bf17c2cf55340d42423c5c51c1054357afd05797a497c3
-
Filesize
369B
MD5c86bee864731da590476ab6ad75a0303
SHA17bbad31c8f024dd1a39b09a0c34cd835f1ac2bbd
SHA256924b7c02727abb02efa816e097eff887d9d03abf1ad84c12373c70017cca8a2c
SHA512c759e617c529f6e09c6ee1dcd8af3ee428d44cc40bf9fdd142b13f8e2698f1708f08fd64edc02f672144a217e46119a20cae3a672e909c60e2abdb1e8560c182
-
Filesize
6KB
MD5038f1e6e7a31d4760a377eadbc3d7451
SHA167210fc51136d2c087a0d664e4db59b75289669c
SHA2564c33e40ceb287428b841e26789f48e2cc34aef26e26f451ffa9d9302cd64fdf2
SHA512f766fb55809580ce50b88b6109355633566ec67d3352ad044d288675b4304927c82cbf3492de704420a55fba302751a52687de33d68356c675165282683ac057
-
Filesize
253KB
MD51b5d0f4f8569e65c7d7abfe50f67eeb4
SHA1339afcf9e17ce1e88c0b2595c3c1300e2883adeb
SHA2566253d1f1416aaf008e20bae384460b10270b69da07af766ab24dcac6637b260a
SHA51242d894233e4a98711532c40be721d3a42ae3e4997188432f3548d2674acacd957a7eb8b77a8fb250e54be2137c64bb28862351898f58ad8ada3daddd4ada1b6c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd