Analysis
-
max time kernel
25s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 08:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://laradio1047.com.ar
Resource
win10v2004-20240802-en
General
-
Target
http://laradio1047.com.ar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687019663292031" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{4D3FED85-726D-49E0-A832-EB55BA1874F7} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 208 chrome.exe 208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe Token: SeShutdownPrivilege 208 chrome.exe Token: SeCreatePagefilePrivilege 208 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe 208 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 5032 208 chrome.exe 84 PID 208 wrote to memory of 5032 208 chrome.exe 84 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 4136 208 chrome.exe 85 PID 208 wrote to memory of 644 208 chrome.exe 86 PID 208 wrote to memory of 644 208 chrome.exe 86 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87 PID 208 wrote to memory of 2348 208 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://laradio1047.com.ar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91f36cc40,0x7ff91f36cc4c,0x7ff91f36cc582⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4340,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4132,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4348,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4768,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5004,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4352,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4908 /prefetch:82⤵
- Modifies registry class
PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5176,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6068,i,13957292787656734701,10783845381102829953,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD50cb8c6a2aa687663e549fb8a36d9b873
SHA1c834d1b1161a899ba6ef9539e8c9f9d4d5dc9cc1
SHA2567696313097f86ee5f27280c26d2a65eb19e2ec2a92a78529eb526fd653a877db
SHA5125074f2e6750dbd1d236b1d6eb4ba04e5b0eaff55e1a8bcb00d5847ca5f1918a32999654cf51b96f414bffe45ae8469b202086b424818c189b3cd59d868a48b4e
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
1KB
MD509052bcf832af8b3c53dba75485026ba
SHA14f132d1c696ac9e4393930918c48b6d52c82731b
SHA256b6f87866b4461b5ad9336f0dd3a6b2be0db6274b407ded9f5b575ce7b59b5a66
SHA5125f33c07c7574bb8d8fbec119ccf25dde1ce9d64758340a4f0681fc7f365053f81d829a2bc211b966e17f08cd8011b960b08b27fea32e34bbeec022bfdab5e0f2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5c3bab30ee8d4dc2cc66b31ba1597d03f
SHA1369752492318db4fe80866b508d7b53813d3de22
SHA2567b37db218be4243e2abc6d01eb947b021af1c0d7fe329162299ca2685597683c
SHA5125a6928bd2dd7b4c37f52d4368f8d4403960afabc331b2b5d1e9783936eea48da25ef2680a84afb48d7cdebaf6e285703fa3754ad91fe1de2764b529b454592ee
-
Filesize
9KB
MD54900475881d0ffcd933addbc94f30d20
SHA1cabbf8d89587493e862fc17841404dcd28ef98e1
SHA2564b0107164691c66ad3d5f0c87896a2e73b0fe0382fd6c26519072a4fe561abb7
SHA5126b2e6f34a4bfce8b07a685751c0805bbee3fe1ddeee784d25f9b441e9727483ab58a1813ce05f9427f7bc7b2e2845bcc04fd8881f7ccdaaa41ebafe281e15fba
-
Filesize
9KB
MD5bae4eb331238052cfda835a020470b63
SHA1f7432afdd90272d5ce2bcc7f0232ff8723f39796
SHA256a34f438c61a8643f9d96a30c742b9d187744b87e25c701e787b195ec904bbbed
SHA5126e3bf8ebceca75cb8553185060a98ca1bc4ce770e5d5e4c11715252a6ca5b327782358f3831d708270f9345cb410963dcf7abfb5e2acc0d291d499947c7ce63b
-
Filesize
84B
MD5d2b784baeafb79b9b4ccd27fdfc76930
SHA1781d60c1bd2f38573d8e9df79b005a9ab2e66cfa
SHA25687f20f5dc332ae278a1b28490c907516f5039165cc247c64cf7c7a33ad4e8f13
SHA5121ce1def30c5fb95abcf0eed181de05f7758e55af3dfa032950e2d780cc3d86dd4328c6a170973987a4f431ce7572dc3c11a3a5fe5fa3f5411daeb5ec7f9358f0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57bdd2.TMP
Filesize148B
MD569ee7bdf5560c861cfcab86cd53e7f3e
SHA1ea54eda3388374dba84e3afecc4bdb80cb86192f
SHA2563e18fe6b293065a37e0a8b2d69c6c87523b9334d01331cb385d7fbeabd0a6da8
SHA512ba39159f0b06e899eef5d6955075282566a74514933385b7be28af29a65c6c3ffbd247dbfccd615b03d52165d22217de167adee37e7d2b15a080504ee211e34a
-
Filesize
99KB
MD5efd71c26535b5ec935343c4117cd8df3
SHA1d1b6b5b419d87fbca2df20e75c937517b5c507a1
SHA256544ed1de84cff538d27e8a057938cda797fed504f1008e584e6a786e25d99d2d
SHA5124271d0c0dacdeaaa172e591532f1ffa4960838bfd5eab99fb270dec4b75f2816c8a35b14ef64444f910afb160f14eeb99e8f057b640dc8d5835d9a03f819b5de