Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
04-07-2024 21:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://files.encendercomunicacion.com
Resource
win10v2004-20240704-es
General
-
Target
http://files.encendercomunicacion.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2300 3380 chrome.exe 80 PID 3380 wrote to memory of 2300 3380 chrome.exe 80 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 640 3380 chrome.exe 83 PID 3380 wrote to memory of 416 3380 chrome.exe 84 PID 3380 wrote to memory of 416 3380 chrome.exe 84 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85 PID 3380 wrote to memory of 1588 3380 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://files.encendercomunicacion.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb8ddab58,0x7ffcb8ddab68,0x7ffcb8ddab782⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:82⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4252 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 --field-trial-handle=1776,i,1585122179266983160,2799958918079256493,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ed5a8eb4d8374d298fd9d39823d797b
SHA190dd58ccabd5cefd0803dae88da822c38b004dcf
SHA2564d19baa766722f1241c02a9e65b4e45db584a031b7e259d1e41bb018dd784f74
SHA51224a9699efb94d5598b64f2b6a669638e6093b9316e72897a37b5fd5ed01c8d27f4405b3632b24e040cdbe2823be05a162c52e9852043baee710ff90446fba2b2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5f7107b2fefae3c9aa24f284363fc7d24
SHA16b23256cceea73018d44d1a1c0a46821d47ef0cd
SHA2568aef2864d5a82e54fa6595cc88b7ef68cf0cf654e385ac34346bea8d20eb64fd
SHA512751a241cf83a611e76e19dfb69d1c4be61e4de779595e01ec8edc55f53c6b67302b1f6ff5a57112dae630aafad292e4d1dc289d3986ab11338a3722260684d8b
-
Filesize
7KB
MD587a5cf513db1cc42c005861be1920258
SHA16b28006f348ba5c0dc45cc05de9f10ac28c753e5
SHA2560d595fb650d14506d042b9f5090aef36500bf881acbf1e11cbe434372c221d26
SHA51281a551c79f68b94c0c24a0fd36352025021e36c4e66277a27ca9c49eaa0256788801ec48c37739c3fb02e4955b2892b031eef7b5eacd8af1f4440b83623c683a
-
Filesize
144KB
MD5d5916ec70bad18b33468ac3f1a87189d
SHA173340485251091eb6c1ae2f42a3f6ca15a52a998
SHA2564c5fca5d4d757aa33c0cfacd075285096182128294a7f6b268daa43d558f52f4
SHA5129a3e1ab8411bcbd7beb81787556d4ca5124830f9fcf158109af105b3898bfaf3ccc7c7aaa9ee1dd37f20457808dd1490520c1ec583dbe50dec55b23b0033fafd