Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
31/05/2024, 21:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ecosistemadigitalindice.cortesuprema.gov.co/api/v1/link/share/665a35fb5624d4c7f0764635
Resource
win10-20240404-es
Behavioral task
behavioral2
Sample
https://ecosistemadigitalindice.cortesuprema.gov.co/api/v1/link/share/665a35fb5624d4c7f0764635
Resource
win10v2004-20240508-es
General
-
Target
https://ecosistemadigitalindice.cortesuprema.gov.co/api/v1/link/share/665a35fb5624d4c7f0764635
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133616645901031390" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4380 5052 chrome.exe 82 PID 5052 wrote to memory of 4380 5052 chrome.exe 82 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 3652 5052 chrome.exe 83 PID 5052 wrote to memory of 2800 5052 chrome.exe 84 PID 5052 wrote to memory of 2800 5052 chrome.exe 84 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85 PID 5052 wrote to memory of 4980 5052 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ecosistemadigitalindice.cortesuprema.gov.co/api/v1/link/share/665a35fb5624d4c7f07646351⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6145ab58,0x7ffa6145ab68,0x7ffa6145ab782⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:22⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1884,i,4056649531346676739,6905445722075035162,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bc4e44ac15e19195064df10b37f5b052
SHA1d9d791115376cdc25dfb2ac11f887279bbe84659
SHA256e7b326f233cff575fd4175b097412b2cc5a1b079157015cd7188aba3c9f94cbf
SHA5126a65e7b476e4dcd568c0e4613a43b1ad58f37e18bd6101015556a416b51a9ddd95e604422c6baa13ab849eaa30582488ac164d363f4c630e430ce4333e4ecb45
-
Filesize
1KB
MD582ea28e4cc88670a3d42aec16917e556
SHA19b2a0fc202dc1e1b0356f60d5d037b0c1c91aa34
SHA256892622baa1982876351cafe1d21c2a8eaa13203f50b65e13e706e8424d154e02
SHA51281d9e039c48b90571ed6d4320818b08ed757e5ef8e7b0eec73d0c9883af79d9c281eb1a26e8f856c65b5091ef5abfb997aa85cc8d9139678af8516320b113666
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD58cc4625494d47a510f5ac039835567ec
SHA18c9722d4b3a7af125c31bded9fda944ab41be19d
SHA256be47c1295e32f62195d2c210210fc9cac41dcb671edbb786b0f7b95f5a2d60c1
SHA512e76136bb63d30f46bb703d87b74f0d5cc97119c5681fcd9f100fb62b76635db926d4c5ecd14ae539a0125fb7bf724f82be63ff446ae1c0d1691bfdd344d7bcac
-
Filesize
129KB
MD517c9606da4b3dcc778596f76d7689388
SHA1229124bd85b68e39836ef1b47d309b8e44169a04
SHA2567be02394411e16716c6765f9b66768b6aef36959e5198c182b696b7c08414e82
SHA512d3faea9f8339ad8914761dbd656a3723ec23e0260b3974b6173d4a9b680e533dfd1e42abd608656f5ec042d6ffc4380cc412c328104a95a413ca90401fa12800