Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/04/2024, 12:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cenf.cen.biz//site/CO/cdpsrecibidos/redirect?RlYtMTMyNDE5MTI4LTkwMDE5NzI2NQ==
Resource
win10-20240404-en
General
-
Target
https://cenf.cen.biz//site/CO/cdpsrecibidos/redirect?RlYtMTMyNDE5MTI4LTkwMDE5NzI2NQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133573130797833040" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1388 chrome.exe 1388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe Token: SeShutdownPrivilege 1388 chrome.exe Token: SeCreatePagefilePrivilege 1388 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe 1388 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2872 1388 chrome.exe 73 PID 1388 wrote to memory of 2872 1388 chrome.exe 73 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 4320 1388 chrome.exe 75 PID 1388 wrote to memory of 3412 1388 chrome.exe 76 PID 1388 wrote to memory of 3412 1388 chrome.exe 76 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77 PID 1388 wrote to memory of 1308 1388 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cenf.cen.biz//site/CO/cdpsrecibidos/redirect?RlYtMTMyNDE5MTI4LTkwMDE5NzI2NQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa5b7b9758,0x7ffa5b7b9768,0x7ffa5b7b97782⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:22⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1600 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:12⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3828 --field-trial-handle=1844,i,3361022391186048034,10316987933523063754,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD531ab98904567a1498dbd0f64c3e92492
SHA1e7726954a6a17b8cbed48844edf045bc3a168ff3
SHA256b312beb8376cb8dd5d393a5f38c97b714f39fc0dbd290497ac9611d89c88f0f7
SHA5125a18b7735c993a1644bb861c65be97b4fe460a069263ce3c1c066654616c5d159ac25441efd4e55630bd20e2799d6a89cd3a763bc4d64d2de82e5e665b3839fe
-
Filesize
6KB
MD54581ac6dab9b0d61ef9bb45710200807
SHA1eb763c7ebb3395c5023ddece9bc02e0bb784703b
SHA256d6227c140db770128ee6de3452b51ccbdd84483062fd437a3af0f1ed0848547b
SHA5128baa0f38a06a1c72260ac06230dd6df70d7a3f03f485180f2f6051891e815dc5cce9fe041332a7adf39c4ebdc7b3dd31d00d3a796ff5a00c0057b3b62f398e2e
-
Filesize
138KB
MD59b061406fe2f36c799ccdbb8baac4c2b
SHA1cffaf04778b37a2191d8f00a8bfab2055c5f4dae
SHA256887d09ce7fa3adcf4f02178390e0bfc819d0955d7535f0bc9144a568f062997d
SHA512a855f13fecdf2a953b3749ce7b78b22444540d1fbd4f374fd5fdf0568c46a80063f8557f035541debc9eb064a9f52060952dc3282d247978e0dc54152c2a0648
-
Filesize
156KB
MD5009c57e1590cfc26a9268055d09d0d72
SHA1686099c5a0be6aba238edb23da83679d47eacd43
SHA2565f6c318f048f806468430dd1f7da4e0af532dbd64c3057e3c86aa8e4cdebc2a3
SHA512adbf269e90b51b13cca3d52faf9fc11b5cae75b5ab57bbdf047fdab80f1d3ba2a5a18495baadb425053fcfbb2c91637688f2cfffd32c2187b8be0b5793a2918e
-
Filesize
138KB
MD5921883061464791a1399e433611b0a84
SHA15e943ca19f1a88b56b8668e1ecb13bd4f750a53a
SHA256a301af0547f0c71c3c974806fc2cce68e7ae8af90956b5d9b6e0d0af67a1c9da
SHA512a0ab92763063234ba949d28ed9d8bbb82f2cffbfe47adb340200d90941eebed5b18359510d78390f163a5b8f63a7ef5528f0292947f41b91fe5e3a1fa43c5e61
-
Filesize
138KB
MD5375b2110225a86306cbc0ab98bb60f86
SHA10d59644533c115b504c1ad6b1b41195571ff2500
SHA2560cac129a8f8b6a8909ebe0e580d681e8f8dcfc73966deb70e08288db9dc0cd2c
SHA51240dc56db8e8486b4de90dece264b259c7e3aa53d820fea38bfb4a1ee54864b972a77d30d52de071228ae2d6632212108ee046602abdd9a7d20e8da662fb1b1ce
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd