Analysis
-
max time kernel
107s -
max time network
107s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-04-2024 01:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.proyectospoliticos.com.mx/www.sat.gob.mx/?id=1
Resource
win10-20240404-en
General
-
Target
https://www.proyectospoliticos.com.mx/www.sat.gob.mx/?id=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580499201660338" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4816 1580 chrome.exe 72 PID 1580 wrote to memory of 4816 1580 chrome.exe 72 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 5076 1580 chrome.exe 74 PID 1580 wrote to memory of 2576 1580 chrome.exe 75 PID 1580 wrote to memory of 2576 1580 chrome.exe 75 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76 PID 1580 wrote to memory of 1792 1580 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.proyectospoliticos.com.mx/www.sat.gob.mx/?id=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc6dea9758,0x7ffc6dea9768,0x7ffc6dea97782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:22⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2032 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1744,i,4547372035696642169,16421610187420363599,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a0045baa932b5c7eb6e22df6acb0e3f8
SHA1639eeb663610014f696ee899dce4d194da5f2fba
SHA2568b704c928ae7e99a04ed5fa1a8c85c44665be44ee93e432b3ed207a1766764b0
SHA5129bf7f495d433c53119eb4be72587fc804dee09304a97e44983965ccabce7cc445e090bbcb73091cabc61f617101150c01d3a96d8de2c86140c09dbe38712b3ba
-
Filesize
987B
MD54e2fc2e14aca45fb4eccdfab36b46072
SHA1560a2c7983fae9a609790d1aa7d77ec8eb842f58
SHA256afc99c54e45727b21c113e53dc16b81489c076a9c4245e414b5787fd388bf719
SHA5127c2edcb907d2ef9fe65348ffa5332d4fafd396197792d0dd98fb9c000c5ee520f840eeab13ec0dd3d629dc1d7c877ad2f5f761724e49388ca0eb7662c2eb4cc1
-
Filesize
539B
MD57d610f297c037546845cdf5bcc602c21
SHA1b615198d7ed8963ca90a3aca8e7ebd52fc7250c4
SHA256b44467e8ddad5db84752187bc73ad5a953c185580809be7e65ce6fda16bcfa21
SHA5121aa24541558bcd0f0c4342a289a2ec95834a01364bd5cd284d39882a5bcee6fa6fd4ccc56129d25a97b6878a0cbea6fc8586dcc9b29081a44a78e5eaa587a189
-
Filesize
5KB
MD5fc05e4a1ddbcfeaac41e834f40453d18
SHA1721ec8612751c2b689bfd4e0524a69e989a09e38
SHA2565443cf2c344463bd44302a3c9f08e2dc8668709faf34aed94bff77891bd523aa
SHA5121e3b1ae25ec7734add68a582558f0e0571ec39b5ea56bd44de05c28d91441f5b50f9c776bd1a5b97f68e870f997c1a8bdd180b8c5e1208bfbbef8b63500b2595
-
Filesize
5KB
MD5a6ade7bad6e3c12aa115facd3422aef9
SHA116c582b09462343de2d35bad848f5a6a5d2eece9
SHA25634403eb110cb7d5d6b52e88edc2d88f074c5c8bd8993d830bf4a704a9ac5403e
SHA51226fb84140098f1e3904b129a05fc4b97e32e04ee0bd6148ba38b9a03f6ab019ff95cbb7688d9096bd4659095a612da7116b2e60eb84161a0fea12562386ee097
-
Filesize
6KB
MD53567e751fafb3f90aaa263ed7c431452
SHA18daf2d77122155cafd66a3f25839756cd91c4cf3
SHA2565a8ade2b3013f0d2d15fb49b14a33bc05feba8f9aeeab74aa6e7063484af45df
SHA5129d66f0a68585659d6a5b66dc38ea7111031eed69fddf8d5680e6d6c9b24ca5b56337a6f368de46098c05b7ea349b8cedf9b440d5fe140a08c1f33a43bd0991fa
-
Filesize
136KB
MD5b45bcccc6da81d11c2b26b05c5ac3026
SHA17b47a7175560cd2676c6fce31c4ea4bc96f5b053
SHA256d618d7ff717aa76a6fccf1714033744b3cf0c1a4acd815e347e9089f8f533744
SHA512700d20f7c61678c5dd34b756b597d0d735670dd455cdb048562d58d9d464406d6eeac889cd8121c54ad54874095038f3632b55e3c9c649d639f3277296bfc3c2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd