Analysis
-
max time kernel
76s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-es -
resource tags
arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
30/05/2024, 14:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pay.neolink.com.gt/VEL4160425zrd397864q/1634938639fe52450/166234246953ebbb02817
Resource
win10v2004-20240426-es
General
-
Target
https://pay.neolink.com.gt/VEL4160425zrd397864q/1634938639fe52450/166234246953ebbb02817
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615522322154001" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2336 2240 chrome.exe 82 PID 2240 wrote to memory of 2336 2240 chrome.exe 82 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4776 2240 chrome.exe 84 PID 2240 wrote to memory of 4500 2240 chrome.exe 85 PID 2240 wrote to memory of 4500 2240 chrome.exe 85 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86 PID 2240 wrote to memory of 4304 2240 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pay.neolink.com.gt/VEL4160425zrd397864q/1634938639fe52450/166234246953ebbb028171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86714ab58,0x7ff86714ab68,0x7ff86714ab782⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:22⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1980 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1900,i,5152717143358095953,12032133958415531904,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5e24789ae68547e069942022402baf797
SHA1e36e61580b78875503a06292e4992809a5c6caf0
SHA256a1310f750ef047145385b228abfec03690a83ae834f54d923c174fd280d2d5d9
SHA5120ff37750fbe80f4d20d90b741eae5d443060e64e1b159a74af63841f1e534d146542f65c0d5c944db058a03dc05bd4ca169632889b5e35efb03266b69fbd9bbf
-
Filesize
1KB
MD5d4af4966ff609f2a83a7ab63b5806a81
SHA1d984ff2beedcbaae695d8653973578f6400e3acf
SHA2562fa81fae5c3de467c29e75e4471277b9981e40a8d938ba7639dca62251b18564
SHA512ee6c660f3a5b8cc86a76ce8896ef643057702dbcd064e041a81a4e849af2cf2d2db3a1099e2ae8e7a85a3f1d8f5f2c1d9d005ba82321e787cf5d9bc8ab6e8e12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD523901eb236eb40d9aedabd06a704972d
SHA16d729b707efc797acd2050cee0b889721f3b118c
SHA256338865aab00dc2ff086291c7905551d2aaed7a1846023e114edfb034f30f38c2
SHA5126db2a0db8db7915f56e6021cc9f7feb8097224f4870fb2aff60d0583006608171b9f3bd516669e8bb4bc42b7660a7fecf645bfe5c350ee10b1501ce69326f7f5
-
Filesize
7KB
MD5c9621701e9b9dfb4fbce22702ecada4b
SHA18aaaef46120a38baf1132dc5bc6f721585dc1598
SHA256f2f38bc4cd7dce4a0fc1490c7f7c30caad4a158847c358b8fab828a537e0d079
SHA5126186f60a42b252b1b4d8f6f7e76e3f32e3f682396c1ba9bddfbe2f4daab15c9e5ed61e1eb51339ca971b5e21a72f1b1955ed54826083e68429cb1a2b6e407ddc
-
Filesize
130KB
MD5f300b8b68936658201666f9a06082d60
SHA1eb1c3f4bacc650224c12ec23533b064a6018fc73
SHA25684abdabe660b60fa608ed6ca1e09cb2375ea1b370a348113430497fa61f2a2e8
SHA512f972b07294f6d75f65634d1a68688d03bfb88a9e4309489d55b793c8d4930d269846cd0a24bd2b1a2e277457e6c5ff90a10d44cdbb8aa8aef7be094bd1b04f48