Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 09:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://verificacfdi.facturaelectronica.sat.gob.mx/default.aspx?id=&re=&rr=&tt=0000000000.000000&fe=
Resource
win10v2004-20240226-en
General
-
Target
https://verificacfdi.facturaelectronica.sat.gob.mx/default.aspx?id=&re=&rr=&tt=0000000000.000000&fe=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591157394385804" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 2248 chrome.exe 2248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4344 4844 chrome.exe 91 PID 4844 wrote to memory of 4344 4844 chrome.exe 91 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 2128 4844 chrome.exe 93 PID 4844 wrote to memory of 4492 4844 chrome.exe 94 PID 4844 wrote to memory of 4492 4844 chrome.exe 94 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95 PID 4844 wrote to memory of 3552 4844 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://verificacfdi.facturaelectronica.sat.gob.mx/default.aspx?id=&re=&rr=&tt=0000000000.000000&fe=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x9c,0x100,0x104,0xdc,0x108,0x7ffaee4a9758,0x7ffaee4a9768,0x7ffaee4a97782⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:22⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3748 --field-trial-handle=1864,i,15822540908888815217,16040761011758898253,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5425b370919424f69eeb2790c51a37116
SHA1b38c970a0eed63082fa4af4718d65f6c9a3e3bdc
SHA256b4b20ced4736e01189ee827f48299f6ccc1a349915fe8d8db19f41371d50e5cb
SHA512e5b26183019a698d6d1958c826c66f5377e2e89c94c8eaec59631d15dac6d08a98fc984de3f3a579d53fdf201d12cb837f8b5ff8024e7a33dcedd1c80d7a12e5
-
Filesize
1KB
MD59f79cbd6d8e1ab155e1e3e8cae5a1897
SHA12247432344590e4fdc279cca092365c36428fc7d
SHA25674a7be33bad6d45fdb55c17c271977b1279f6488db7e82694e3bcb18c062826b
SHA512f076eb17ef15863dc8b878c2943ff23534a448905cba308a590d7f0335fe1306fdd9ebb7442482c9530906071855d2c6e16d0c6659cb80e96a832d9b11e79809
-
Filesize
986B
MD53d47a127d50d052353dd22a192f13631
SHA1612a331fc3453defb3fe3843bc9ac7435494515b
SHA2562742902cd61945e421c76ed8d0e72b878706c95a573e4c14b3b10377907846b6
SHA5121e58c08abe1191592ebd2874d9112a312ee5fc06986335fed691dda63e3c78bbb5902591771f3cc76260fc54f484db72fcb872a4f290ecc35f7ef43ebe9b2bc0
-
Filesize
536B
MD500e5f40184a03e45c026c9a726042cfc
SHA167611ed0f94cb0250916b46f45588cbab973800d
SHA25692d481a2efb2d8ff81d43c45b4afc5799d43fffa562d695e093a864105feace9
SHA512c60a3b4e6cef8a5bc2ba7db8169bfe07eaa3fdaf5893e243aee43723dff86fdef5901e215cf47719ef79f62903e9dd0f662986ae5ce8394503db0af7362ee89f
-
Filesize
6KB
MD592961593321c4eedf3bf7981b02acaca
SHA1b196eba3412ce62a73c3276e81aa7c4203224785
SHA256205f1434d89ae30b45e3f3fd7f4f852c1fa4c1ddaee276b9748e4af1851d13bf
SHA5123400440fced3fa5355f4247066247d120cdfb40373fa09f8ac89d187fa7a5fbd179077dc1c702a32641bd995269453ea2dea06c6a1c56821035e19214792c947
-
Filesize
6KB
MD58fbfa7370c1fe27a9b89f5ae74da9f9f
SHA1173a0f09e555f1f2444065bc2d5d9bf37815caa9
SHA256741e529c065a44cc6dc2f0d333d46405a5c10e161c557b5e62e37c7ed45c2688
SHA5129df3d14366861b06db151931135c0c166dbaca4cab16a53d91e73cad5572b91443af273628a65b52bf0194003c68444c56d2a934cf7b73a3d570b84f2f1a6dba
-
Filesize
6KB
MD556c8718739fcac587b5ccc952b537f4e
SHA1f8d430b18c1680115e6b5d1e4c75d0b53cb0bf52
SHA25605400a7669a85121aaee32c7549ac41d09f0282b2b979324f161fec4ea6688b1
SHA5121785191152b005a5bdeec2b12e0031c98a2a2b910ff6f110a0eb2a6463354ce35f1511a02b44107cf864000674f291755e4096c630d5c74a2b9dc91ef5f11b5f
-
Filesize
6KB
MD52470df05fa029cab2875770f593da363
SHA1388d82b429248fc7d5c396ab435820492dabf477
SHA256f201023083bf98350d050bca18225c0073df490521f044288debfdc5c88334e0
SHA512149f11fdcbb0b6abf7324d4418cbc36791a510c9c82c15ec55d9fb27805684529ee9d0632d10e228908db1af0c02a1da913474fcd05939f82ce0bae56bc3293e
-
Filesize
128KB
MD54eb511c7e62cb47a4b0b1d0e8351cf2c
SHA1a95ed8d025517de73394308f90667c337ff33a02
SHA2565cecbb7eb81d72147d3ca46de5ed712e02f9e486ba380a91a9b5a4d1b25f802a
SHA512b56392ff2ca2a3d18555bbb6c10b425dcdfc35b614e71005df15eca760c7f835083db4c538345f45066bca6b4bece980fa247531da952c9bb5f7426526b12b71
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd