Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
07/05/2024, 00:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://a-consultas.top/lngresarenlinea-bntrab-gt/login.php
Resource
win10-20240404-es
General
-
Target
https://a-consultas.top/lngresarenlinea-bntrab-gt/login.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595157757889446" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 3708 chrome.exe 3708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2880 5004 chrome.exe 72 PID 5004 wrote to memory of 2880 5004 chrome.exe 72 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 212 5004 chrome.exe 74 PID 5004 wrote to memory of 208 5004 chrome.exe 75 PID 5004 wrote to memory of 208 5004 chrome.exe 75 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76 PID 5004 wrote to memory of 1456 5004 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://a-consultas.top/lngresarenlinea-bntrab-gt/login.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd9b2a9758,0x7ffd9b2a9768,0x7ffd9b2a97782⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2028 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2808 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4736 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4776 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 --field-trial-handle=1820,i,14752759519752303697,13059124547899134613,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD53c7506c266e8b63da7ee200aca3e7e02
SHA1fabd2db1af33f395ad73b0374c4968aad5ec0e6b
SHA25693c9cdf97ec4e8ca1bd439cf179bb565f31ca6373832f6e5bc3d3310bbd9d7f8
SHA5128ee0415d5b52b0d774d42ebd3e6eb75314ad01847cbdaa702ae34b95a20c1db96371ec1076ecc9eac7f0cde04c001963c764a1eabf0c686867c11fa6c385dbf5
-
Filesize
1KB
MD53971eab9abb1109b36b8c5b12f3fbfcf
SHA14f76ad6574085e9b705686e99ea59dce78678faa
SHA256071f63c88c9d6a06f426818313fd81681529832d287c40c3bf207e4f0446c508
SHA51276f6c889e7d585ef0cf855305ceb826d8dcb19535527c40dfac336f2d3f6736a3fd877a0c760b940e01faa10e39a1fb8bb2a3ba2a122e92cdf4614e7f843c4a9
-
Filesize
539B
MD5013dc12e9fb306d132f09e938ec2fadf
SHA10e7d2fc5d993acb0b1afb0cf1b7507cff6e3703c
SHA2569c28d9ce45783fefa4261129657d63f0e6ff213fc34696b3fc440077b43e82f2
SHA512c6a950176aaa3c0d0cd558747341e1d555fdcaec51ee4d88f7437a35103e7b348dbf59b425795461db7ac755ecfff7f0ef864b826aa87fe23e5b177e0b3f224d
-
Filesize
6KB
MD5877c59eba5d1ef9f2c54b72a2e3e6ffc
SHA197ed3f79bf5688e5faaf15b68229ed3fd50f6705
SHA256edfdf16deef81db93bc63611f675e8f57b84d7ba3eae88b7459b6cc404c1fdaa
SHA51292ac3bab3beed0a03cfeebc0871644a674f92396e8b07a149078f12dee2555e5f751197fa14a83875b2790fe56ffa487fb21b3aa60373e9ab93173ab3572c08b
-
Filesize
6KB
MD5b8085bd936af27848a07a5c48a33b647
SHA106b90965a4c59fe11a503d821d3c21437fdfa8eb
SHA2568f92f538a3c2ac25b825be19ae112f4ceb00ef99990913cccc999fa03b1d6842
SHA512f333b1fab3a43f4f76c8c7516ff758cb6fbcb80e9f59d542cd5759eba23dd32e5a4320682da3d7647860b9bc337f71affdda9da34495aaf942383269f5085d70
-
Filesize
6KB
MD5c355027636f333826068ad63a36632f7
SHA11e66cd4df3f13db4941fb24bffa6f66d504b63ed
SHA256b6229b2aac60e5c39e4fb34a01b8de26851c6a403d5d29545cb186faa6141cb9
SHA5120bd8e22c489d067c9e41dd804fc83136c942aee929388e601c8d4d43fd552f53a08354cd26603327711d2a7b30677fa20b5a37b106da2f86436bd0024a3fc374
-
Filesize
6KB
MD53e2881b31882e9b1e177a385a8bb9f3b
SHA1644e92fb370dd715a906e0286c68060ddc29a3ca
SHA2567efde4b813c8dffc12270f21711ac85d19a0a6f2845b02f748ebd234230f3bc2
SHA512e69ac688fb9dabf54e18537c89d4fad4a4235a201d1ec3ded89ec22db574d4d37ca74fd76a59b04937316ad64b72967c7eb8af2aecd56c4011f35275c4da050f
-
Filesize
268KB
MD54f687fe58a29f23ec61157fcdbad2ca0
SHA19def02087a27ffdbb36b90503fc6556153bc962f
SHA2566379810175520c5ca03f9c3a2af71741d0ccb3669fbaa9d56184069cf34855f8
SHA5121adc419ba5b4a493953faf78ff55566b5b66581580d0eb19f15205156ce972454f1275e84613e9172e49019cd783ef8ed76e82561e3f3091d4edd973379a7a06
-
Filesize
268KB
MD56ff0810cec625939f8d696fbf70c12f5
SHA19cf56809e33412134820a58d6d47194a6c9061c8
SHA25625a265d306a8209b3afa41a26dccff4bc8902e85722401a9cdaaafda904bc3e4
SHA512bdc1cbeea6e6e30d2d3acd5efb2e2f96e2b69f987af7dd6d7882e1feeaf15ae29559b281530ac5b7897b4f77f4898f3b6cfe0b15e595faaaa19b3e90346b6308
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd