Analysis
-
max time kernel
209s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 03:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.dinamicaonline.com.ar/assets/AssetManifest.bin
Resource
win10v2004-20240508-en
General
-
Target
https://app.dinamicaonline.com.ar/assets/AssetManifest.bin
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633260620034258" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 336 chrome.exe 336 chrome.exe 1652 chrome.exe 1652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 336 wrote to memory of 732 336 chrome.exe 81 PID 336 wrote to memory of 732 336 chrome.exe 81 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4388 336 chrome.exe 84 PID 336 wrote to memory of 4720 336 chrome.exe 85 PID 336 wrote to memory of 4720 336 chrome.exe 85 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86 PID 336 wrote to memory of 4164 336 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.dinamicaonline.com.ar/assets/AssetManifest.bin1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4014ab58,0x7ffe4014ab68,0x7ffe4014ab782⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:22⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5088 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3444 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3916 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4884 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1528 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4652 --field-trial-handle=1916,i,15000132656740199893,13430160596408130867,131072 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c37d027428cbcf78e742e6c5f23c8e85
SHA192bea84debfb9f122c9cbab9563607d54028201d
SHA25679847b421cd82a3bd2bb2304d01bbeb4ad4fe62ecc4f42249475f377fbab317b
SHA5122568a0bf65d0b38d10a8034dc82e14e7688aff3d85ecb67e812ce7a6e60cc73d58f55d89150e4921072a1fa4fb131d64b84f7ad229edaf7c2880ae4119546e30
-
Filesize
7KB
MD52f42b7cf9ed5e88c983559b2104fbbf3
SHA1c4a05ec2d317f0249baa78d04aab5e9d2d422711
SHA2562bc6cfb7efca16a1cbbfca1be556add93b4d45d470366b883053ea8787de8fd0
SHA512937da4cfbae76f92fc52739644adf867b37ca3b654fad77de49e143e656159f69e41b7f625426f697cc5cc220e9eedc9914c36025aeafb8a977f8a7c51a85232
-
Filesize
255KB
MD569e4caca0fdb1eb3de0dfb298c2e1220
SHA1b278000c41e0302da2848e05a2ec2c9d3d0f973c
SHA2564d8c8c4d158519a9211f948d0bc2b405f415ab0f9422ea2c1bd79a27fe697c16
SHA5120fe1eb646b14d29763ad4be6b7b04edd6146f2d599eb470ff3c37d01e7435b0b6d440a12cb86c4905198ea4fce34a14d182aaab338fe48b697baa997ddc741e7