Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 20:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://segurosaludusa.com/
Resource
win10v2004-20240508-en
General
-
Target
http://segurosaludusa.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133621778830291400" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 chrome.exe 856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 4168 856 chrome.exe 90 PID 856 wrote to memory of 4168 856 chrome.exe 90 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 5108 856 chrome.exe 91 PID 856 wrote to memory of 1000 856 chrome.exe 92 PID 856 wrote to memory of 1000 856 chrome.exe 92 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93 PID 856 wrote to memory of 3056 856 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://segurosaludusa.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff852f1ab58,0x7ff852f1ab68,0x7ff852f1ab782⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1944,i,1181471052273618265,10596122874080041858,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4296,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:81⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5eda34f0ea8b02fa707f4a233b9bf4c73
SHA1d8a485206f723a12c2f738a48bcef270160ebd00
SHA256f95a636d001e34ebb6c41e866a9b3433acba2862b4e6120525c54100103276d1
SHA5121aa8dfc91eb71c2bdc69fa6292c69ffd2cd85b7251e98de2a4a83c09789a9404655dc9ca8b0126b113fa6bf7c92c4df78b3d8968de3c50e0161c825eb78e1d6f
-
Filesize
1KB
MD5c53c538195b550bc2f6ee74ed637129d
SHA111898c7240b67d0ddc4693895d6131ec0550977d
SHA2564caca33fc2a14f82629ffd2d280b8a4359cf6547909bb1037734ae97cc2b834c
SHA512e3ec3a472c2012433b622d5f6d510fc2c00a22cd5684af06652930136a62104392e87153d32f4bf182f90bfd85f32ac30cd67f717994a140ff80fb9df7440a34
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD51d4f2afd949d3de4cddd92ce4bae503b
SHA193db0d576a3e76c1f7891782b3c1387c171bc116
SHA2567074a9ec424839294bba0b8ef546ed240a0e1c2b617ab10a0fd1ae46158aae92
SHA512242a3be339943678dddc2858a78ae0e2347eb3f5d5b289cd04a822df14d00e7e316d72a6750a5bfe6a7da0e397cd6a98b36b6dc6dbf9502bcd1ae9f6933da596
-
Filesize
7KB
MD509f8aef7efa9f90301f561f7ba2d4aea
SHA1822c10fde7c8c66413cb9fbb257dfc017d95ee1b
SHA256b0e703a4240f3acfd09e1e68ab30d2733d60d38a60beeb106390d3f5952b4cf9
SHA5128b9abf0c241a054c90933951712594437984f81a309148473614a02cbf89240f2b84d4b2a8c74f7e69600735bd02d20c29eecf3a7eec418f6cb67eb5adfb6582
-
Filesize
7KB
MD5d9c6f6b63a4c8eec57e87186238b0961
SHA1c6efa474e3ad7df75fa9f555f4c46ec65f433720
SHA256291024bbd27e91c289662f53a554004d9405d2463645168266107a75a8ae7c67
SHA512313bbbd432ae0672a077c3a2e099783847c0e2472f6d46ca1f10c250b1540f5ccd5328fcb055452a62fe84d3b305c0b7e86b748edd535f63930cd526ec01fb75
-
Filesize
255KB
MD52129fd84e8c6ba41a724b25c1d7a4d29
SHA1fc07e24ea1eedfaf4c90b2fb0ad7f72fdcd4e597
SHA2562b102d6ed5f4ddb9b2b9224d6eebb01087e1cc2af781137b99d4e37a2fd058e6
SHA51202637c5a44a55d2555e3885c4ae7f9d66aa91a2c748ca5fc8169109964c8e41edf06150b5ba8f7a65dadaa8f6c7160e5c828e27b5790e7cee9b36884668b3ebc