Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 13:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.getyourguide.com/privacy_policy
Resource
win10v2004-20240226-en
General
-
Target
https://www.getyourguide.com/privacy_policy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559344302133611" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 1956 chrome.exe 1956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2132 2288 chrome.exe 86 PID 2288 wrote to memory of 2132 2288 chrome.exe 86 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3484 2288 chrome.exe 92 PID 2288 wrote to memory of 3924 2288 chrome.exe 93 PID 2288 wrote to memory of 3924 2288 chrome.exe 93 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94 PID 2288 wrote to memory of 1384 2288 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.getyourguide.com/privacy_policy1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbca19758,0x7ffdbca19768,0x7ffdbca197782⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=408 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:22⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2752 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5552 --field-trial-handle=1932,i,11207064927937576227,2595749601038191854,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1008B
MD5de93e67777d19b36fff0bd01e5519e8a
SHA1f90b3ea5de79043202e17495993bcddad6410a94
SHA256223507a5d8ed17ad4e38752095a0b27c4428ac9d37f9ca53cc44261c51288cfd
SHA5123b01ab6d576a0252e5839e9ea4a4c5291af9b2cf5e23de9f3dcf33b01054bac4498a0667dabea08b586b8d914c2b491e933dbae0937725ae18a27d7d7acf3498
-
Filesize
3KB
MD5248f21d6bac7cb9111822640e0b44ad7
SHA176a59e6fb7cb0a217585dced93c988720c4fbfa8
SHA2564abe2d4c63666a39ccbf51af3efc921771e9e87b240174f9244fd182d0fef472
SHA5124dd25ea81d5075004a2224fd06e32fe8773d33d74b2e3f5c73ad36c0ad94f266f4be0f0aea4592a2b03c287f65a1dc531aa1cce5806e8276a84082b1c8b58233
-
Filesize
1KB
MD5796310dcd2f9a27aafe3d6bdbc76a4b0
SHA13817191e949daf19a22ada6f7e3d760b79f2a3e1
SHA256fa1bec73143d7005a872eabb4a8cade31358e6e18b64514450cdac98f750a32e
SHA5121807e4c186feea209118212f07dd9879d07990666727dbfe5678f34631dd6551fa64990e4d39347f11d65384e08f92cb4a30d30d5141fb4ee971a7bd2c29bc97
-
Filesize
6KB
MD59d0c0cf65bd6944aaae5dba28c7bb722
SHA18639faece0ad880bc965893d57eb281fc1155c11
SHA256433a9d491548c55ed5bb5fac6daea5b1c8082305893d463ac74eb934fabca1ac
SHA512a349fc8a2c46963decd8d558b3311663200564898f982287de3098110cb9467e81cd1d4e938563cad083d65576a6760f8fbe7793a7c814b21d9e875c9445a016
-
Filesize
253KB
MD5481dbb692a1a3f25a0073ae586895e76
SHA17466d276598fa1fdd1acfb91fd4ec811d11b9896
SHA256d51c0177a403669f22e01e06c58eeeaab2e59ab5dca8ffe8765ee8e82a2f9767
SHA5125c524cd270ab24228bb744cf8eba0fc55120d5d4aabcc44842b5f89662e58de1d1e241f121ce615a85dc97e41cf55838f6b2aa37d65756e7a231c888818b3ae2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd