Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2024 13:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.uk.nespresso.com/r/?id=h859505ee,590c6122,56f60c49&p1=gktaas%E3%80%82co.za/css#0808d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==??VDUBMZHGRS=d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==/..=WBRGNPNG&u=276b8dda4ef94158348d5b6b8&id=6b7205781d
Resource
win10-20240221-en
General
-
Target
https://t.uk.nespresso.com/r/?id=h859505ee,590c6122,56f60c49&p1=gktaas%E3%80%82co.za/css#0808d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==??VDUBMZHGRS=d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==/..=WBRGNPNG&u=276b8dda4ef94158348d5b6b8&id=6b7205781d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549839535768111" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3288 1424 chrome.exe 73 PID 1424 wrote to memory of 3288 1424 chrome.exe 73 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 2892 1424 chrome.exe 75 PID 1424 wrote to memory of 1100 1424 chrome.exe 76 PID 1424 wrote to memory of 1100 1424 chrome.exe 76 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77 PID 1424 wrote to memory of 5024 1424 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.uk.nespresso.com/r/?id=h859505ee,590c6122,56f60c49&p1=gktaas%E3%80%82co.za/css#0808d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==??VDUBMZHGRS=d2lsbC5pLmFtYnJvQGdtYWlsLmNvbQ==/..=WBRGNPNG&u=276b8dda4ef94158348d5b6b8&id=6b7205781d1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff816149758,0x7ff816149768,0x7ff8161497782⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:82⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4544 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2880 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5224 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5348 --field-trial-handle=1840,i,8947360425214887318,7181105103311165733,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4172
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4181⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aea0324535a69fa02cf4e628246ebcbb
SHA16b714b062e623e39ad70277df3ecec2badd65b21
SHA256879e9a2a4069ae5963d307bfda90ffde60a306071eb6d6343bf4751c54e320cc
SHA5124ff31d23a2f221d91d6c99fe915ae7bfc4d3f0603a6776c1097730619f479edfd8cef6b54bb2f84037ac7afe762103c42707db29b5cc49d5b2009f107790b34f
-
Filesize
2KB
MD594307eca9033ad5b57315c0e62d8c5fa
SHA19285144b0486ec6d3427f4174ee53de67a5028fd
SHA2565059a0647e6926494eff1a1deff043cdcc22dadba35b759fbadc77f473da8379
SHA512b4e22668ff1748fdcad4d20d29c4810e370ab218b339e7f27121fce615cbff5ec2f9bc7858f5089f624acba770c8ed6280905bfa59a634433860b7b275184b93
-
Filesize
2KB
MD5b4de7688201beece74ad19d759f7b4f4
SHA183130d48b94fb4dc00608a332fc9d475d15f5f66
SHA2568a168cc076bcf53b8bf015a7f228009e8a24a817515f0329785f67adafdbf539
SHA512639f4017d90a05294d1fdfc04064a733c60e03c0244ea55b5a066237ba895472c1492c4d7023e686b08b83d371c3a9afd8b7a6cfcf32595de890bf1687175633
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\de17c210-1702-4538-be5f-05e00b5f54a4.tmp
Filesize2KB
MD5c55b6be3fe3a885481162a3278fc3859
SHA10c220caefddaad360b3db9afee8ff30e5476b0ab
SHA256aa389ecce15b19d5bb654ad00f92e7eb9a110827d6ad17a308bc2127d33fd6ca
SHA512b64a96cf7470eb24dd2d4279bbdccf99942e69f79d0de79fd0d5564b71b7c8fd4273fd768440143383e2372145d61062066cb6f5f41085f61a20acb772f910ef
-
Filesize
5KB
MD5b689a140d4934df29b1843c70a020bb6
SHA15c7884c22291703c1a01b156dcdf71e3c159b7f1
SHA25654a0f859197a1c16965c729a0fbdecbbab1c6a4f9ba489ba392ae5a12e5e72f9
SHA5127a3971ee6985922146e7619e0e17002aa18f9471e1dcd8467af5b4cca1a647bec9636fa27df76026b232820220e18e6e8daf78711981621e7c08c524757dd362
-
Filesize
5KB
MD5009af214f28dd655f92af275a44cd3a8
SHA1e4e74eee48114837a5cfc41230abd1a7d328a9d0
SHA2566cb9e251c916b278057a17d529d6640a25730974672f7acd083626f803c28a10
SHA512ec5db6c740cd621a4d23313a4cc263ad2fe67d73dc0572afd84ab7d92bb8794f710e21fe444c7cbaa514dc8d19ab4ac881de67f4de008789cf2bc4f23c19e41d
-
Filesize
130KB
MD54faedf942dd7a074d808da71fe8abc79
SHA1be3961e96387b61d14c606a338ef5793cdd15ed2
SHA256a92e44c762ec025acd30a7014788755ab6c0d24500e5b362d2a416f006c94856
SHA512d9fe411f55c8af989f22816d1dda5f4f6e775087788a83b44d7ab61713e0d5d6ed840690483799cfd7ef382cb1dca3b5c5526d4312a113997d9afd0d06d32c89
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd