Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
24/05/2024, 18:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://portalsat.azurewebsites.net/
Resource
win10v2004-20240508-es
General
-
Target
https://portalsat.azurewebsites.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133610483053101923" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 908 1944 chrome.exe 81 PID 1944 wrote to memory of 908 1944 chrome.exe 81 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 1984 1944 chrome.exe 82 PID 1944 wrote to memory of 3844 1944 chrome.exe 83 PID 1944 wrote to memory of 3844 1944 chrome.exe 83 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84 PID 1944 wrote to memory of 3228 1944 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://portalsat.azurewebsites.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c13eab58,0x7ff9c13eab68,0x7ff9c13eab782⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:22⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1820 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4296 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1664 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 --field-trial-handle=1952,i,14132933271922112140,17042831091641588826,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD50ce9b49f227bb5e93f3abc01265ea583
SHA10688e79aca6bcf36152d410b226d2472101c2c6e
SHA256f9445a398f674363c98e47abc4c84a408c9fe96793c8948bec9f8d3a94d64884
SHA512e47a0a9ccdec68939228546e241bd77ecececed5cdc48e0153b32e2760822dd073980d12cac9a0aa576a1afcca65f3b21e538fc9f91acfd0954a46d32c27ef57
-
Filesize
2KB
MD541373be1f9ecf2d9fc3041ec46113aa3
SHA13aff79b70f9ca0007cc61d5f97b173b456384fc1
SHA256f3e87db9e2a9be45c2438be0c14e7bc564a60384444225c63b44e07bd16e521e
SHA512392c4b3e21594b85fe765e47aef1356472af61b79d8004389c86a960f1db3e455f55b8917b404c82d9733ca577d510bd9d01a8dc70c58298f30240f76ef488aa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5da828edfa15c6dcd58f429c9d14c45b2
SHA1336e40d32af7e49ba5a40b2fd0fa1d8a474f1295
SHA2566ff44ef23d4d9c82bc3f6b7280a9062300da1340421592523cca4b157a31936c
SHA512231d619610f6f7ac8841f6f8305faaaef3e7e80c622e34887140ac33379629bb9cf2aaf4dad7fe7b33b54058daeef475e39b428017371b390ea68e0f871c2be2
-
Filesize
858B
MD531dc1371687248266735b3da85dc9cef
SHA15e0c45f138cb9963d4aa87bbe6f5ec7ca8ed6ef5
SHA25619c98ffb8cc590af0a16f18c715adcc7d5a1b67444bd370106c41d0b750111fd
SHA5127faa4b0f4ba095d13f4416939af0ee3b73ec08592efbf98fba8af3a79dd0053913408cf27ad58f5cd82783376031bcd3c05b3617188edea33d7acd842dc916e8
-
Filesize
6KB
MD576cf0a0bb6b28122f006cde57c9d2de6
SHA1320d35443ce270ed850fbef711c7b0ce1da8a6f3
SHA25662bf0ab86b5166be942762d1f6babe51d5262b1bebf8162f73db149a47997840
SHA512332f4f841e84406c3ac1ef1f77a2d56be85f2567485f8cb05433a7f3af4a9451d811af1eb39a74997db4eec729cd2c3276286170f0ba42c27087d4f74b8e31cd
-
Filesize
277KB
MD58e43be19ad08a15ec21de299fc2974f8
SHA1b1cf91e67678dde7fa2cfeb7e3cefee83a0f5ce7
SHA25648f3d6c024d358af9de471b180ed5ee570ddb311366affe6cc1206164f9fcb90
SHA5120fe235dfc17c2db8652e513618baaeb326ef3b806adeae93099d005227e172db506616ca6d156cf97273f6efceb4549251e8350ff9a4e7799726187462b0819d
-
Filesize
257KB
MD5c929e6a11d609066a4bad2bc8ca80701
SHA197058fe2e60bdad8c8dd2d92e0dde29fabb1f5b5
SHA256e02444a4a4309bda94aeeccc69675b806eaae319de977c90977bf857850c05e5
SHA5126bcd6758644dc289e285909c5e2df29d76dcc995649220f3896311a799e40dcda286717212d39083b04eae92fceb22e4eefd58222d03cb2d9d2dbbcdc9746c1f
-
Filesize
257KB
MD5e55667d8aa6374de3c26619b299dd8e9
SHA15cdd0a0724762a7b819486bb3195fbc2a2a3bd34
SHA256c76309f56bac97ee57c0bfd8f1cd572d2fe792703226d8b12a02f254cfe585dd
SHA512e4f9ac51fcf73b48cde823a943709df5fee8ab9dba4503b0015fc79af9864cd7e83103dbdc092066e5b9479cdf19cec60a15cc20ae5127fd5e00405f94be01f5
-
Filesize
257KB
MD5c3608678d697b6459a01bf4a63422e26
SHA1f8fcd2ac484c0a817d5dda9d3a204b9669ddb6ac
SHA256e137a9401360ad4964ac2506f0481d9abd390f1b12b163bc78e03ae66f371ee1
SHA512abacccf8300b01f0eb333a3e43dc6b372d61685967cc192d45609dd67b63a6975b046763d2689844df8f6daeefa468d918acaf8b531c4e446da813431118864d