Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21-05-2024 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.aspradco.com.gt
Resource
win10v2004-20240226-es
General
-
Target
http://www.aspradco.com.gt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607738720227262" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
chrome.exemsedge.exepid process 3276 chrome.exe 3276 chrome.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3276 chrome.exe 3276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3276 wrote to memory of 2064 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 2064 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 1716 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 2564 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 2564 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe PID 3276 wrote to memory of 3476 3276 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.aspradco.com.gt1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffdbe9f9758,0x7ffdbe9f9768,0x7ffdbe9f97782⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:22⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1884,i,15153027765614643126,10424109578212983599,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3484 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1068 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5ddb4453d6f7c866efe3b77ae17b49580
SHA1660600c9d1c2d6c974f4e0a12d530a80f5e8501a
SHA2567a50ca3fa1c7fc1fef0121335038040033cd4cb778ee1a73bed1eb1fb0ef1ab1
SHA512961275e0a02b406b8eddc487da9b94b6beaae5aac429544e8fe0142469cb89147afb11ea9099bb0cd8381127f5cb9066a8cdad127eabe7a78b62b18581ca6308
-
Filesize
986B
MD5fc27b3185873d14fba2955f61953e835
SHA130f5791c4b9ffcb61bf487195175854ece2478b4
SHA2566996b30a26bfe145ebe64a4b9b6a4712ebb2e72bc088a85f63c3c0890946188c
SHA5127cc3cca70cfcc335eafffb6f4da6b18a0383fbd951912976f7ea10b8c9ad9ee49ca6cfd8267c5e70f56d35de60ef604deac619941107dba696aa26e9b7f88f30
-
Filesize
792B
MD59db913f2b3efab1b9aa82c273fffddba
SHA14bb05228962de26d6df193e767bde8943eade5ff
SHA256367e563cc6782a7d251596defea49dfec05c9cb1f6c13bece72b6bd5c8447069
SHA5125e769212235456c59f62c5e26eb45b6841e4dc2a7e705d4e4334cc78d4ae182bc82bf8ca7fd1a69864b4e7697200f0bb8cac257ab69d8462585d262f42849006
-
Filesize
6KB
MD5f153a58ba5467afb75c9ef9c8bd1a4c5
SHA13bf65176abc03c2735b52a30a6794cc981bf4fe1
SHA25620eb3b28d1c76e131b8d61318b6948a5ef0af13f9bc5edb4dc04aee5388923db
SHA512b66de2d3df5d2a67b48ac2eebbb504bbe9e6649c5f9803de57983f384079c00c99226cae3c69f24f6b8a1c1f6fb28365de2be318791f744cde17fa80ff15060c
-
Filesize
5KB
MD549461c402d0738b6fbd4df7934c2b073
SHA10eba45f7db58f3244428b72374039b2a574a3517
SHA25656c614ef70539b3f87199a5fd1d27671318ed79e179668a91145c9301c8cd5a2
SHA512e03b9a89b0a23558c6f2d3091265f85084fe289d1cc8fee02c344f00bbe3ce29a36d288b1e436f97f60fa824966068d5dca59fb86e5f53418c0bb47d248a47d3
-
Filesize
5KB
MD50bbb49235e98c1febf468ad5bcac85f1
SHA1eba3c9dac065e05334650aa9b5fe989b0a9f6de7
SHA25623d47130fb42eb828499e6dc187ad6de89b660d627fb29bca8ea36c3b08e6a18
SHA512b5f34e7e9b966654521104b06d5a9d6893646cf104efd698c9ef143a3f15de78d753cb024c7c55c8dfa4bbbed65f842beff41d6e9c0780afeb94cdc702578850
-
Filesize
253KB
MD5a3f2e446f4cb85509c964331e71f55e3
SHA1c8ac93cf4e5424014dc37ce9d7d28601cd7cc3db
SHA256433e1849f7e8fdd4544223a39da22429ef77b89a49490a1fa066e2b4097a6e2d
SHA5121bc6fb8fb652f1df53b510f8c0758257fef866b0ae2c32d69837300ae065ce3233a65d4d461298fd10308f3a66cc16c3bc3fbf31ba8f3bbff191ee564beb1268
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e