Analysis
-
max time kernel
300s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-es -
resource tags
arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
30/05/2024, 14:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ecampus.sat.gob.gt/formacionsat/login/forgot_password.php?token=fvf8R0oVinN0w2lpaj6xCFB4UMW8h5x0
Resource
win10v2004-20240426-es
General
-
Target
https://ecampus.sat.gob.gt/formacionsat/login/forgot_password.php?token=fvf8R0oVinN0w2lpaj6xCFB4UMW8h5x0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615512463774093" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1712 chrome.exe 1712 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1712 chrome.exe 1712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe Token: SeShutdownPrivilege 1712 chrome.exe Token: SeCreatePagefilePrivilege 1712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1296 1712 chrome.exe 82 PID 1712 wrote to memory of 1296 1712 chrome.exe 82 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 5080 1712 chrome.exe 85 PID 1712 wrote to memory of 3124 1712 chrome.exe 86 PID 1712 wrote to memory of 3124 1712 chrome.exe 86 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87 PID 1712 wrote to memory of 1788 1712 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ecampus.sat.gob.gt/formacionsat/login/forgot_password.php?token=fvf8R0oVinN0w2lpaj6xCFB4UMW8h5x01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd282bab58,0x7ffd282bab68,0x7ffd282bab782⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1860,i,13299803089028970265,10419326648777790678,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5aa57cd0a70de4f23ef992f0ddf9452d5
SHA1c171424d388237bfb19d658820d77b7658cfe478
SHA2564b09d8c0d9cfd6dc418fffa97b1625eb9d09c07e3ffe8617b750c4dff063663a
SHA512155ecc45e84667f5d18ffecba4fe8c42772a3133442c1a71ded95d12269e121d3e88db91036406e2b4255a0e9910f8554d03139360ff2771248013b5decb4053
-
Filesize
1KB
MD547923307805aa1cdd603cd0b08ddc13d
SHA19167727dbfbab8c8e89ea7116b088db87618dacf
SHA2569bad611f03d79c3d0649c3a6e043ff5f82c02a083b0ef29ff1298ef89ab101a3
SHA512872b1afe15af6b93a47d5a0b7456cf2dfe12ae9f3a6559e00906a54dbe7fe15ba1ef14ee7013b9da97e8aa14d264efeef176152a4f0ad6bd6d435e39ec957ee8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD502276be4430ede9ee19595242bd6116a
SHA1c20a7014e40f8f4f4e50a52bca4e01a20af3027b
SHA256e4b16030206af0708ece5c6e9e6eb68953462219f4a584d1c0c521704ea21c29
SHA5129e0665fbf4801204c953cb19a9d49082079120a7ac7e7ec1c77c24bbb9d2c7c241d63203aceca5a9f65818f89fb10bc17b53262778dd06f2c3e772006fe935c5
-
Filesize
7KB
MD5e92ebd5fd25d98104e5504eb071365db
SHA136435aca0cc755137ebe6366fd43dc63acc451dd
SHA25642d66eace374e9395bddd423205fba4a384175db0030f21544dc9d820ba945fb
SHA512422ad791ebb325a1882c46e13c08f809f5049ab54dba2bed9920d13988485d0c28368c2c7e544fc7763534e3bd2d4f9abb5b9c1a97e2080dace98bdfdbfc2763
-
Filesize
130KB
MD52a516247388ca951da706f4e28aeb15b
SHA1dcd989803e182070f979aa070d9659177873d546
SHA256a4555eafb5e1ace37216ac97952dcfb61ce437161e1993277d9724e755615bc5
SHA512c0376cb34e69f232b76f3e17ecea9397658ebb6f627c893b0ebf3ae05b27be80afe6e1d9329e22fec735eb6965e7a79f9dfa6068585254eda974a04a363895e8