Overview
overview
7Static
static
1URLScan
urlscan
1https://1fichier.com...
windows10-1703-x64
1https://1fichier.com...
windows10-2004-x64
1https://1fichier.com...
windows11-21h2-x64
1https://1fichier.com...
macos-10.15-amd64
1https://1fichier.com...
debian-12-armhf
https://1fichier.com...
debian-12-mipsel
https://1fichier.com...
debian-9-armhf
https://1fichier.com...
debian-9-mips
https://1fichier.com...
debian-9-mipsel
https://1fichier.com...
ubuntu-18.04-amd64
7https://1fichier.com...
ubuntu-20.04-amd64
7Analysis
-
max time kernel
1802s -
max time network
1698s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 14:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
macos-20240214-en
Behavioral task
behavioral5
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral6
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral7
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral8
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral9
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral10
Sample
https://1fichier.com/?wldrirmud8nkymy69chj
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
https://1fichier.com/?wldrirmud8nkymy69chj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559362116904225" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3968 chrome.exe 3968 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3968 wrote to memory of 4004 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4004 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4948 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3740 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3740 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4456 3968 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://1fichier.com/?wldrirmud8nkymy69chj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8f1a9758,0x7ffd8f1a9768,0x7ffd8f1a97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4676 --field-trial-handle=1896,i,10165874845623788936,13056015804204892543,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
312B
MD5c385fd99f1018cc8b47563077bcbddf2
SHA16e7534e51018082506b8926e05d7a0bab9260229
SHA25689633078a8d71019f09866b0ea0f0293bff9e075ebfda6eefd38b939e725b727
SHA512563c9ebdce41d4af9d8b6ad15318132067ede4e141595b44396eb0c0be20b9ed82e7136866667e5c6f15a1b7e54f7c999a4f4c451376e6e71216563245a14945
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5418093b503a23bc2d98499f36a2d51ac
SHA1a8ee20c9c69a880242954971831c8fecd70d3452
SHA256d7acfc29649174faab1072ff18292775db2cefabf0ca75f7e6a53dbc5f1f87f7
SHA51296bbe3370be5d41517b696452a6a29d87e1b10278437721faced1d3238703f665822b9a493ebcc6b51fa351f2822e6f9210127288daed1efd3eef9861c86659f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5774eb8da67b9c3a06009a0904aad6e2a
SHA1fab201ce25c3ad7ebeb7d4f36b8ea36813304d8d
SHA2560afa2378096dfe18c1b554333342d2d9cca5df46221ac015ab994c22352740f8
SHA512fc76b08480a56dd45a9a13bca159739a80cdab82c8ad9b6d12b6c3a897db4fc6196437f30d4a1cd76b391e982f367cdf1ab346e6e79441b5d75efdfd55699e35
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD53a7266d196692062006faebf08a67eb2
SHA10fcb06685c5f557625fa8109426809cb3ec45a74
SHA2569f0e0d78e47f422f28dd12a7b46191cc4737a04de8a36a1cda9d277824704a94
SHA5127591c535e1a8d66bfb7f7ba204002f07c317fe0507486aeb657fd1d37c5a3db467ef6a6c558d1282265de9b7fb94080e0026360a0b553dfef1c63fb1e4cec3e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5fc82c69137d6fe2be5b38fb809c8440c
SHA1776f6a523fa0e2d4a609f46a3c1e91cd4dc59f5e
SHA2561e57356f2afb876fecb3f16f0754a7b4eab66749f49f807c68a653be6e967659
SHA512bbdd99dde9d1ddae3b75a07ef23b854b800a893c6ef794657303d369014dd4a52d6d7c928fad24edba29764945710faa2d01235cb65b55cf1eb3957033dfbe53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3968_ATNFNILHZKFXWWGRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e