Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 05:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://news.centralplast.pt/inc/or.asp
Resource
win10v2004-20240226-en
General
-
Target
https://news.centralplast.pt/inc/or.asp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633338930423010" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 628 chrome.exe 628 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1604 628 chrome.exe 91 PID 628 wrote to memory of 1604 628 chrome.exe 91 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1612 628 chrome.exe 93 PID 628 wrote to memory of 1204 628 chrome.exe 94 PID 628 wrote to memory of 1204 628 chrome.exe 94 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95 PID 628 wrote to memory of 3632 628 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://news.centralplast.pt/inc/or.asp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e6ac9758,0x7ff9e6ac9768,0x7ff9e6ac97782⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:22⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2656 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1892,i,14568770089165218010,4229405068687591953,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4024 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD52b33c04a988944b2af75f085be8bfc1f
SHA13e0292063c024a30781fd38dc1e120348ac34b8f
SHA2569a4e02a227edd61e22b994eea3bf00284c152dca80c3c39885c7234bfa8e16dd
SHA512c545d183e3f992d5c9a6345ce30290e9516730fe646c1cad33abb3f25fb3957754a7361e3e85d4565684a4aface1d66d4a9b04a9589fb3663c5eac95e55f2101
-
Filesize
768B
MD527d6b2da7304be7c61cccfe31df3a510
SHA1b3984b3dd2e6f788d8bab1af8ded14e9271be820
SHA25694a77e09bc432ae549f7db6f7a4e105e44d6418fcc11b679ba566ba1797ada55
SHA512ecfb5b6af4333edc0ba6a5ff2e7dd8f857803963858150e5df81e4bb22c57a3ef1ae71c363f27949cf2306eedcdeef3b7113b8ae099cdd1f36debce23c0b6a08
-
Filesize
5KB
MD50d9c735a9bb9233a5b38b34d572e4656
SHA131bc33340b592de3b1e3d3d5110cbd4870012e3d
SHA2566a19f35185b90f0cf09490a374870ed5901e8bb093b803718b951a996811a49f
SHA5121bb88d67b756870b7a8e73dcc1d588a0a489cd33d0afe4d0b5b9b437cd09b85f95322a364f7ab0a210624ea7798b6dc9eab2d33650e86c40199e52ec3b1f4639
-
Filesize
5KB
MD5b1303824d806ca8aa6043e66ae167f59
SHA12a952e2478f6866e072df1829773bd364e66dbc2
SHA2561988752cc694616777e4cd10f737289cc110e3004921f099959a0e529b004344
SHA5125ed0433fcca1be5edef9c12bffb5bcace92a98f5c2f758006d283274e6f0b6d9679150a024eab50d2dc7f612b346e6a97d970b05f5a5d4bd0062e05a9ece2780
-
Filesize
6KB
MD542990125750d89dfb7651d05b06ecf6a
SHA1a5fb4088a275b0dff349050ce926b763ee6e2426
SHA25698d9c40bc30ef326c264a790893cfbbd8af556e2ae08ad376da4cca333259725
SHA5126736e1a994e75807f91275b0987827a78e5064a261e104baf01c01580e0aebbb0df1b59b5881aa938e5fb1af65a61d6f3b9404bd64341da125231aa02ab4eef4
-
Filesize
5KB
MD528a57885ba0cc8a7368d70496e889d33
SHA1ef286ae3b7dd9a4636e4eda958ac77b8a288ed3e
SHA25637aaf4b27540b7fca838c9e8ae7acd7edb7f84e8c4c54e885bcfa4b3c23cc3be
SHA51220a10c110d5a89447081801741129742c563b783d2130552b1e4715c5a9321f23c42663d3065cf5e56de9b7b09776db5edf5b9efe94f8831cf47a651d80273ae
-
Filesize
6KB
MD5561a1fc26252c7c9df5fb4016329dd90
SHA1221194f9e8544d97578f402dd808f50b5de38d54
SHA256447c91b23b160731502818b1d2c12ed1193bf087add1b7b38c6b748398766736
SHA51264ed9c52e55ed9f0b21366f5b57250c9f5c9c7b462b406dfe1ad6a27230562084184ee215cfa96d353b92519241648df3db823399f9e8b8cf31cd4851a0e910d
-
Filesize
128KB
MD54513cbaf1e2e450413419058d973c2ac
SHA1da996e2d5fbf694f9bb99d2e83da4d00abd4bb4a
SHA256f083a5c11f05625db7ab0dd8865820fa40642cf6fc7aed5dcab427463b076c8a
SHA5122c3f5aa1cccbf15c19fbc764cc4e626015c738ed2397f002f12f8f3314b108891797546a58c0c6b008eae9d70a534a27c761ac507c718c0904efc4516d91bdaa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd