Analysis
-
max time kernel
26s -
max time network
21s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/06/2024, 15:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.prd.dfe.sovos.net.br/DFE/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://app.prd.dfe.sovos.net.br/DFE/
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
https://app.prd.dfe.sovos.net.br/DFE/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627663606132982" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4956 1184 chrome.exe 73 PID 1184 wrote to memory of 4956 1184 chrome.exe 73 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4592 1184 chrome.exe 75 PID 1184 wrote to memory of 4076 1184 chrome.exe 76 PID 1184 wrote to memory of 4076 1184 chrome.exe 76 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77 PID 1184 wrote to memory of 376 1184 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.prd.dfe.sovos.net.br/DFE/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff935d89758,0x7ff935d89768,0x7ff935d897782⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:22⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:12⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3840 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5356 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5528 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5536 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4872 --field-trial-handle=1820,i,16447252736467667064,4762003321824881636,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD5259e0ee3f78edd26af79b6a51dfb9892
SHA10d51c719284c157dcaea3fa8493d55007e42fcf0
SHA25630207b883d1ec0ebfcca89107db6cfda1474064a3bbe2cd162ff84b800a364bf
SHA512b1c7a408c15851d8a21cf762f6c97efd77a3d5939308039a1716dc50802c94b2b24f31057908d47861bcaa3eb3885964584ff7c7baffc201e112fda6b44077ae
-
Filesize
6KB
MD54e095613e86e1fbdc4c9d7c30e35b284
SHA1b6ab934ccf201aff9da10a1d137657d1bd195ace
SHA256973914084702e5fd0bbd262f51a25cf0f3b7820bc6e671c16786a723ec37b255
SHA512abe03df101ec6558afbe9b581b99ed88cc33dfce1e93ab8ece0978b52cc4ed9ae5f6c226c2e3a6d0e73684cd0f785daa15fbafb79d9d979a060dfcb0f0ab6b72
-
Filesize
136KB
MD5638358970c5de384192dc47aaa1a6525
SHA1870a6608bfab62b5b4903b85551014a3065c217c
SHA2568cc10ed317f0b7f473454778a7360d29b42517949e8c2753a33a8c744e8f4126
SHA512b35725dadefecdeda3689640daf61bb74ed3cad791a83c787f0a22475f98a1484e42582288e9fa3d080d90cb4d586185de452c5e2002286462952b22c64a5235
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd