Analysis
-
max time kernel
1799s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 11:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://free-mobil.hubside.fr/
Resource
win10v2004-20240226-en
General
-
Target
https://free-mobil.hubside.fr/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552333823261458" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1860 chrome.exe 1860 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1860 chrome.exe 1860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe Token: SeShutdownPrivilege 1860 chrome.exe Token: SeCreatePagefilePrivilege 1860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe 1860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 760 1860 chrome.exe 91 PID 1860 wrote to memory of 760 1860 chrome.exe 91 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 2212 1860 chrome.exe 93 PID 1860 wrote to memory of 1756 1860 chrome.exe 94 PID 1860 wrote to memory of 1756 1860 chrome.exe 94 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95 PID 1860 wrote to memory of 1700 1860 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://free-mobil.hubside.fr/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaad609758,0x7ffaad609768,0x7ffaad6097782⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1800,i,5898245575084013216,15910208845716297104,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5c26128ddf313fd9b64c2731b96a9080a
SHA102634b823c3fb8cd1a7bc42543f760e04f96b8d9
SHA2565966d53a6e8569cb0f1801e313b196d9045488a9b6b9854da7757ec524b29aaf
SHA5128ab25332f3027ec9b33c55b99fdfc43256c89a02996a5ab27ca54a65162d4b2973468e996e8e69739693dcc600a949ca75b0b8a848bb360081e44ed548c88009
-
Filesize
2KB
MD563d6192daa7dd9ed9cd7f2c451659d03
SHA1abb7a4b8c7ff4db741d35810ee104bb150ea2d17
SHA25665d1f777cdd52d137d3a9d674d29a36c7b9c9c0985c268c18474e8a56fa13fec
SHA512288d303387b6afc33c92c297af33585ecc4feaefbbabe636de6a5f5528496bc943114e2abe7aba0c3abbb7b2d6bede109c4b34093bed67ecafebd0e5a915ef8e
-
Filesize
1KB
MD51e51d9c1f0c0c531a4b5323d7c89ce53
SHA192f67366a184e4e2ee8bd0fbe75eaca6de0db83c
SHA25644e97a11ac5e80faf420589e3fec130769779cc6e12a4c1132c71ffe4728ca09
SHA512d7fd332eb335e328de1259edf488e867c6b12921985009a285a82ce6cb7f3fc605c954773f94b28cd225f3805ba3bd93a48d2f402aaa35eeb5ab73b13311854c
-
Filesize
1KB
MD53f12acb56a863ae10af2b342d8e85f3c
SHA19696be7a0d4ebc9a13bbab69d72b8f81dbd03480
SHA256f26d549f2ad554bc6ad1f02c4abc44aa7587a551ba5926fded160425b2429b1b
SHA5127eb64d48bb296b50fd04d8acec7bcf75015fb8fbf1fd57ad7457123d908c5b1b3421f3e5332de6565eef54181af5d70dec00d7e9a0254fdb49b7b4c51251d79a
-
Filesize
1KB
MD534bd0f39dae773b36941502f09d1ecd8
SHA19a67070f2450c93fb2fbb9ffd7d2b167784a68f4
SHA256a579284654cc78a2c5dd47389269558024bd8bf12b0beb071ef2f9e4c7beeb0f
SHA512fdd78fc49acbce8c0888631d884c3cd61713d7e4888f47d2015f1b21514d241e1f208e36ed4d68a3a8955317107b0b24b04ff7cf456d4ad858d381716ffb763a
-
Filesize
1KB
MD532328fd9414b68b63000aa8e67f3d9a7
SHA129a019902138d3a87dfd9011f83de2a26524d0de
SHA256beacd7b9a36ff2888c48ed1e412098a0321415c0ae8d16ebd544af592175182c
SHA512fc34738a016bc1c1629de74422b040db37c3b734f19c805e36995ebe71d8a77b9d0670e9a71eafbe40af7c7bc1f2f444879fd91a8a0b3449c9bdbc59664f84a0
-
Filesize
6KB
MD54613a21c272c32105eb926a8abf1f727
SHA15439fddc06b6617f68202920e75de69c096b6221
SHA256d98e88de2b57078a6f46dbb70ef1b56a70696b5e492aa648c4c5557cc6fc0445
SHA512f02cadc84efdbcd728b38335972e7d9e52a08df3ca9419613163056128e5c04da26cc9ffb32424a8327f552c432990c859b464ac54592b68330a8112134afa44
-
Filesize
6KB
MD5eadca00eea36456fd265c9d34fd62aa3
SHA1a65b342c0d74aec485f30ddb696d8291bee00407
SHA25604e8f1b28be623b04248c47d02680d8773cdad00c027e39812a7de96f9a9f80a
SHA5125be04c9191a63347651a6efbf26f72ba0629d8ecf29cc1e4c5b9ad528d94811e31c580ccf11ad42935350a4ed5b68cc5dd8a872046371e03ef778c4c8ee1327d
-
Filesize
253KB
MD51bde289067f30774911c827d8947184d
SHA1feb66884be7277469c7fda2d4be874a97d114429
SHA256e8a9fd4118ba4026af4391ec9b9c446ee0398b2824b1cc256f945e1cf1ecf899
SHA5123e8a7ab4b08fda790ee2a7b288d4f3ab4bdb61193c0e67bc21d13440f2a6151ffb2c05d650f8cc48a1dc8ff48af24774325bf72f824ae506c47d190011db4157
-
Filesize
103KB
MD5f09931c7b4db815045a51f98fbfc7c4e
SHA186778df080fb3c8282fa369ef71df7a289af676b
SHA256ccb229eba8d4928c1bc6572e354e7a9528de0a24e9bc8efb1fbfaf13dd061ba8
SHA512cfd4801fb91daebc5c6802bf1e16291de1d746e14d3571a9fe2467ab1398aff23eb346579750ed6e374989ccbf6f0717b88b8d95336ec300081bedd941d081b6
-
Filesize
101KB
MD59621358593db77628574e074f08cd011
SHA1e276c9ee17587985c1d22301d6ca496e756824fa
SHA256d9c964bf904a22c9e2cf98eb8d0980cd13cfecb926d44627b29555211e689ca4
SHA512a46174d6a01bbc6f08c59767a9c3b5175c4e06f41cee0ce4e4a765178b2a865f9623a78c44637842b0052e832266029354821f548213360001672b9da8be11ba
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84