Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 00:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.pensionissste.gob.mx/puntos-de-atencion/ubica-tu-CAP-PENSIONISSSTE.html
Resource
win10v2004-20240419-en
General
-
Target
https://www.pensionissste.gob.mx/puntos-de-atencion/ubica-tu-CAP-PENSIONISSSTE.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589971908994068" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1228 1984 chrome.exe 84 PID 1984 wrote to memory of 1228 1984 chrome.exe 84 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 3264 1984 chrome.exe 85 PID 1984 wrote to memory of 1496 1984 chrome.exe 86 PID 1984 wrote to memory of 1496 1984 chrome.exe 86 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87 PID 1984 wrote to memory of 1348 1984 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.pensionissste.gob.mx/puntos-de-atencion/ubica-tu-CAP-PENSIONISSSTE.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcb7ffcc40,0x7ffcb7ffcc4c,0x7ffcb7ffcc582⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4396,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4672 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4744,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4832,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4928,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3328,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3380,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5100,i,13616599131451616081,15757283296234784259,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5da2979536971ff42572f620697b88063
SHA1ac5f0c605ebf45c119a804c5e9bcd1707378a632
SHA256bec21c30ef7b96e1ce8bf49f92650ababbc90009107bb7125d5a865918e93fd3
SHA512bb79a78eece104ffbcb125053470d0117291e7a7344cbc4a7a85a3a6f8d7ce3af0704eaa56d519b70ddda2af7c98c64f7bea864f23fe83b0765a27c5503746f3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD51652723c866ebac4e91e1757870cd003
SHA18e6434d6531996d1bb9261c523572f19029b14b3
SHA256d263ecadcdb07aaae47cac92f3339cc18b99eff1d38bd6016b89641c744243ca
SHA512303b81c0cbd7eea5df58d4afc415cdcad1e6fbf945fe66fac4b840d46b84047ffca294f1061c62cbf58f972dcaee9f3e4444b6b517596bebb505f3173f7f5f7f
-
Filesize
9KB
MD5b869bde42890de48d127a5fb5099c8f9
SHA154939e07ddfe0badbaa33120f0c1f7b431383bc2
SHA256140ab984c05ec716110fbeee87a3f96c7ca23a8176f00febefd292d8010b4915
SHA512f3a4d4b76854a4107d5fedeff3757b35ae5779e46f4f2e82410c766aefb391f994b16b474bf87f02ccf2b51f802748544ff6a5836089d08f5ffd55e26f51f35f
-
Filesize
9KB
MD5ec3ef65c313fb5f9c23711dba5ba0681
SHA138d1cf8d20d5cee16745faa0ece05f462be5ca8e
SHA256a5b2df924b6589b0cd09782c64411707437f767870a1eaca175db209aa68d152
SHA512eb0a1770e4d7031cddc0a495b83fd812812e25bb344984edb80596055bc87c65de85514ca72a79a584bbd4681ecfaa8d2320113674b6ad960ab5ff6b4dade630
-
Filesize
9KB
MD56bbbf1d1245a21f62854db66026a8171
SHA1be18403459a94c702266e07535dfe9f3cc59a895
SHA2562fd8909ecfc2cf33f1492d16c270cf2d124c95f8459b8f60bfd6c69f4eb16673
SHA512d2b45b8d752b1c38b0e350ce5871a38854d2923d22ef0819c2203a935ed20cd3acd81bb13063631952e55e500418a8413eef889b0075ce8382e0fc43e149936f
-
Filesize
77KB
MD5775239891d500d96daadfde8a1e63baf
SHA11c61a816ab7435848cf90374e75ff5f932ef09b4
SHA2564c3186e6ab288989ab915a534c6e19bc6d649e045f4b6fd3005dca59a3ef4869
SHA5129b4d7bc9dcd613624911b8b2bea9594bccd7b1b7e2c7b134cc183be0bbaeb7fe631c6575c45d26e68e1f206c29bc70fd9293a35664648075dc0336fc01cb81e1
-
Filesize
77KB
MD5ba211dc6fb2b362a99fa107ef0906a64
SHA1c8e82bd7d6c9081976b25d817f4d3b81a93659e4
SHA25680f845aa8c77fabef7aca24c22060e37919293cba2a07f400683eb80169b2182
SHA51208194f809ec38abb4c5602b66685e5ae2907fe28c8280a0a12ceea468ecb6d73819b5e688c3c79b4251f81334fa9345043bb34ead99be897bcf63e6492c28197