Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 13:11
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://965515.direitodelasporelas.com.br/feiriavbd/dhruyyatrts/qoickledon/eowofh/tuhfhyeyf/blvgic/[email protected]
Resource
win10v2004-20240508-en
General
-
Target
https://965515.direitodelasporelas.com.br/feiriavbd/dhruyyatrts/qoickledon/eowofh/tuhfhyeyf/blvgic/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626714984661140" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1644 chrome.exe 1644 chrome.exe 3708 chrome.exe 3708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1644 wrote to memory of 2460 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 2460 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3568 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 2372 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 2372 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe PID 1644 wrote to memory of 3444 1644 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://965515.direitodelasporelas.com.br/feiriavbd/dhruyyatrts/qoickledon/eowofh/tuhfhyeyf/blvgic/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1790ab58,0x7ffd1790ab68,0x7ffd1790ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4196 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4408 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4876 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4772 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 --field-trial-handle=1888,i,5203333537110772091,11412570563999840552,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD513b791269399236a286bbf3b5d25790f
SHA1586a5513eb2828222612e3771d573f837a0abd0e
SHA25641312744c54089782e2b0623ed58cb92e94997a0890c870e78404ff34cfa6dd4
SHA512290806b1de9a143b150eba821f17331ff77d8ffa4b850d20d4971055f13cd97c8d29bbf6dca33706c75536649c601bb6e2225b4996c23be7a5d6f47618613bf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ddcda658ab755e338a93bb1022061fef
SHA131d2579f7784a73fb04fd23faf551c5b28212423
SHA2569ec5c465448e549030f1a5aea9920a21ca8c4ae1c13967bc2342f34cc103542c
SHA512a1e3c5ae60d8cf94f4db445ecf7309352d2ea1bc7d0056ff2481e6a5aac6e1303013d7dca22a0979b47b67eefecdfe010f1aeee97dff3abd93d45386b7dc76e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD5f1a5443937e01596a4e7735bd3931dec
SHA12a96e10d8ab81c26ff5730905eef70609963bd70
SHA25681480efac2deeb7884440acb5ffd24e9e6bfeb4c6d577624f1bd0ea6c6e308f8
SHA512b2f429179b218f5d5a5707a2c2d4e123d2a8bcb25599320139708e1409db9d30f3fe00417c98943e05a80b33d01da74e5648d0d611a4346999a2d044068a160d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD5aff9da1aaa7b14a4ad6de051af7631fc
SHA1dc1247b97f9aa03e36084074d4c749a708a170be
SHA2561acfae51c55382af25c7623e3e91403bb03313037b187293708976e1cfcd8dbe
SHA5121c6074ed00f9ec63f78b73fdaa05f8dd6db057193a30091c5fe05f32be1ce7923360d230d3b483f7b541b0e5ac0e5e53551a5a7ba9490a14a65ba90f01306809
-
\??\pipe\crashpad_1644_LUUBWWXOPCWNKKMLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e