Analysis
-
max time kernel
600s -
max time network
588s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
08-05-2024 22:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secu-aqui.top/
Resource
win10-20240404-es
General
-
Target
https://secu-aqui.top/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133596826250222345" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1364 chrome.exe 1364 chrome.exe 1960 chrome.exe 1960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe Token: SeShutdownPrivilege 1364 chrome.exe Token: SeCreatePagefilePrivilege 1364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe 1364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 3356 1364 chrome.exe 73 PID 1364 wrote to memory of 3356 1364 chrome.exe 73 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 3568 1364 chrome.exe 75 PID 1364 wrote to memory of 1920 1364 chrome.exe 76 PID 1364 wrote to memory of 1920 1364 chrome.exe 76 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77 PID 1364 wrote to memory of 4712 1364 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secu-aqui.top/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbe5769758,0x7ffbe5769768,0x7ffbe57697782⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:22⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3216 --field-trial-handle=1744,i,12233755083981571354,3798339114310269878,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0cb364bc-9ae2-46f4-874a-027bf2bb32ac.tmp
Filesize6KB
MD5eb1d82f14156d0106535be0b9c71e0e9
SHA17575f8007e0a35d849f036b6fefae09184cf6c2e
SHA256816ce27e517ea18073809e84182f0330057f5ef3a54d5afde29338da3ebab012
SHA5124960d593fd301ee837e12a6fe894eea764a81dbd6b48b5a257ab558a4b091602bc9ed53f5f83549fac7d03b205d93afc021209366fa792b2f6ddd7d9d890fd79
-
Filesize
648B
MD582ec4c910b8e8deec4da911811ef5792
SHA1c646f730a446fed87f0cbc61574f2e56dbeb6735
SHA2560e3bd8a8d5c5e79e12d8630546fbecdbe0453366dbed188ee2aa310507115bc3
SHA512698e2a0ca6b416aeebd7a4c36809d8fe37b48281cc2b67de8158d6ce7385ff160d45e2da315b3af4b19a1352408951c4ad7c2b72a556dc29e450d2b8a62c67d3
-
Filesize
1KB
MD5f04342d5e1b3ead3909a07585dc1fce3
SHA140f10cce2c0e29a3e4e002c466d76df55719b792
SHA25608b464e9d4547536165b0a18f8c3bb7952e17df5244cbdd1c4d048c98634d6f1
SHA512551a95ce0b518ddae84288e1787478f4b0ce407e6d3daa0c6c1337f19a9c6b7cb1f83f6b2053dd91abc7818b611f38761fc3b331257392f7b85fb2962a7bb320
-
Filesize
1KB
MD59370bd03809a9e6d6cdddba0c77f5d8b
SHA1a7180afe1e60248ec5651329ad1d5f5295ac2d73
SHA2565d24e8083ce9439952dac52d3291bfe640360dd22005b043750af1dbc2f0f8c8
SHA5125896deeb6783336314abce40990df067631e968ca8061b6a25c0aa64ea61f1ca1493e0738807fd53407fe71ede104a18501fe41518dfc598d6320baad11473aa
-
Filesize
6KB
MD55ece6c3e0b044a914c4ecb155966f66d
SHA17bbbb6499052dfe6881703f8c65f86b492050873
SHA2568007ff71ab07988e09ef8a5f411af7c9e02db3595b31d165207eb669cfb0ea77
SHA512323c45b8eb91af8e2af123212019ae46a468dc908355e0c9b7887ccfb2050e5cdb1d21e57b1c4a826f266fcadcd649d4dfc7e2dcbbf9a444ac6d06228a1b8ec2
-
Filesize
6KB
MD53e23fb28c83f05f4545903bccac63ea7
SHA11956ca77831598b6be511ad4dcebac83d35f02d8
SHA2564c33dda131f47199b6423e115f4308e27c65675bac5ebc47cbd08c41695c1964
SHA512b6eafc1103ffda90e6ecdda951de603ac7ed67b9e3c2f8b927b11699e3e911acfc31e4376794d088bb55d673ee3875f23d18b32bb818f9af4d79e0d9d763aab0
-
Filesize
136KB
MD5f331cf96451fd319e50c4194d8fef5aa
SHA18ae2b98f9fab989358802dfc06020db2eee2f92c
SHA2562bdcb52bda1e76126ca321a18ac196c017a5b4a58e22ea34585fa87267bcdbb4
SHA512c8cc0710f886ce606a3da4e0be03c24bd86129f1a6566f8cc6a3255bf688cef471ec1d93584a27cd52d27bfec8ee66242e141394454aa1046f1639032239d801
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd