Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 20:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://links.mail.tefal.co.uk/ctt?m=28653844&r=MTE2ODk3OTkxNTU0NAS2&b=0&j=MjQzMTczNzEzMwS2&k=Download_Tefal_App_Banner&kx=1&kt=5&kd=https://tefalfood.page.link/29hQ
Resource
win10v2004-20231215-en
General
-
Target
https://links.mail.tefal.co.uk/ctt?m=28653844&r=MTE2ODk3OTkxNTU0NAS2&b=0&j=MjQzMTczNzEzMwS2&k=Download_Tefal_App_Banner&kx=1&kt=5&kd=https://tefalfood.page.link/29hQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558724134331681" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 4724 chrome.exe 4724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 464 1384 chrome.exe 85 PID 1384 wrote to memory of 464 1384 chrome.exe 85 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2536 1384 chrome.exe 87 PID 1384 wrote to memory of 2480 1384 chrome.exe 88 PID 1384 wrote to memory of 2480 1384 chrome.exe 88 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89 PID 1384 wrote to memory of 2132 1384 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://links.mail.tefal.co.uk/ctt?m=28653844&r=MTE2ODk3OTkxNTU0NAS2&b=0&j=MjQzMTczNzEzMwS2&k=Download_Tefal_App_Banner&kx=1&kt=5&kd=https://tefalfood.page.link/29hQ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa73e29758,0x7ffa73e29768,0x7ffa73e297782⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:22⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4960 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3300 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4664 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4644 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1820 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5384 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2336 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3340 --field-trial-handle=1764,i,13630512164271938649,15289650381149575812,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f5d6d941d58b39c87cee7e11d8842fab
SHA19861706921a82096dd5366f5ea896b1a65623364
SHA2562f304d687516ab28ca8f6657a6a70a6462ad32e29a5da9bb7413450fa3bd4a5e
SHA512f0a6e464a0188dc2aff5e407b357ad73f058b63ec619537560d04860f356998a511688fda495c06a352f7fd1d2aea65aea69c029cbea6225f4a974d80e62907b
-
Filesize
6KB
MD5c62bb7c61ef0db27e62d1336151564b1
SHA1b46bd3cc7256facc7c53d5b681c73a894fca20a4
SHA25670fdf4080c11e12c2c62800aebec05006d9e5a4782ad952d31983ce24b568628
SHA5121589cfd35cb420b8048ba82e8cd09959ddd7cc1e2c7e0c1b5d6599d90909320bc1fab709648e572374c218e50b36f9e2ec2e7c5db4b1924d24c0d9eb6c912870
-
Filesize
6KB
MD549a5ca283fb22d372a1d0b9424d006a2
SHA1d2d92d708431714322e2ba5af3c0e1eddddb92ed
SHA2569ced1261eb0dc722880079a9dcc0548841292daf33ef74fb5443e5561b2df104
SHA512e4aed47a0bf522aa07fc35ae07082e696e2d9f8b85b1018a5633c472aedcbe306be1dd3f66f7eef151a78f90eca3f93fa2f9110ae6fd162c6af2d28f03dab9a4
-
Filesize
114KB
MD5468c9a85a12e68c41725769aea409f59
SHA190c813694bb06fde9b7dece4e4b5974e9cfe6f43
SHA2564cfeed2bb8d56157c532a5e24624b50373d022dbafbcb49dcd09d956b82e91f9
SHA5126e96cf27b3b8cc95f601b2891c9151ce2a1efa69792115dbbd2432fba8d93e89370786b86ed8a193187847b7a09c61b1854d27ba97c10a8d808f7cfef581ee75
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd