Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 16:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.luxotticacustomercare.com/_framework/
Resource
win10v2004-20240226-en
General
-
Target
http://www.luxotticacustomercare.com/_framework/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541290625883928" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 984 chrome.exe 984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe Token: SeShutdownPrivilege 984 chrome.exe Token: SeCreatePagefilePrivilege 984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe 984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 984 wrote to memory of 3788 984 chrome.exe 94 PID 984 wrote to memory of 3788 984 chrome.exe 94 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4236 984 chrome.exe 96 PID 984 wrote to memory of 4704 984 chrome.exe 97 PID 984 wrote to memory of 4704 984 chrome.exe 97 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98 PID 984 wrote to memory of 2156 984 chrome.exe 98
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.luxotticacustomercare.com/_framework/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa36cb9758,0x7ffa36cb9768,0x7ffa36cb97782⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:22⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4688 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4620 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3236 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3212 --field-trial-handle=1888,i,17936397838396398981,4956572999650556340,131072 /prefetch:12⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537B
MD58402552ea63c6b3e6bd8ea8bef17bf34
SHA1b6a3916bbd821e087dd9161cc5f960f98ab1d1b8
SHA256261c2bc9355be30f96ae343543fa42cca2f7b56b5abc408edcaf710d853476bb
SHA5120e08596e9a4586adbb359d455abdc010b1fa8346090f20bb9e3390da10f4770f3c59b693bc52c83ba5185e8991477d4a819b59a1ed428382fe4f5c3f5b631cc3
-
Filesize
5KB
MD5e5bb69cd1b31c5409ee62de5da13e216
SHA1f209c18ad61f232285c6c5e7dd2e826a6d307145
SHA2568b6e21c70366f1321b7589c2c1d7013952224167f958c57376ed13c51afba920
SHA512c344f7d9089e338e0bf18a814c63816cd3b873d0a8d5ec71654ba1eb57afa9dc581d1b69b5bdd10d09c9ecabd4feee4d9e1d20d9be7169a6a994393e3b6cb8c8
-
Filesize
128KB
MD55b0e487196989dd286414e5cc0e1d3be
SHA1a789f528dc9f9e8bde501fb5cb9515184ac0e686
SHA256e5ba3b3a6d610d5f7ed1bf1bde8c7f90917cb04a9c0a5124d2ee6b6d2c16322c
SHA512a814dd08e1027e67b65badf912259aa4a5421298923cb1389b964afd3fe35a57c1c8eedd4c07f86feb62eda688c828515f32f800c733af014f1d222a372519aa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd