Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/04/2024, 15:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://my.vyopta.com/
Resource
win10-20240404-en
General
-
Target
https://my.vyopta.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572349114765294" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 952 chrome.exe 952 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 952 chrome.exe 952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 4536 952 chrome.exe 73 PID 952 wrote to memory of 4536 952 chrome.exe 73 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 4568 952 chrome.exe 75 PID 952 wrote to memory of 3500 952 chrome.exe 76 PID 952 wrote to memory of 3500 952 chrome.exe 76 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77 PID 952 wrote to memory of 3372 952 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://my.vyopta.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa8aa49758,0x7ffa8aa49768,0x7ffa8aa497782⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:22⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 --field-trial-handle=1784,i,9367990016956918375,10230144608001905210,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD56da8062f298a789b341df24f6739bcdf
SHA1f8337a77e10e3ab0d0b6ad65ba6b0f6e02287e21
SHA256bbc60eec5af5ea2c96da0fef77d99325b49045a016b7fce94b8bc3bd26ed66d8
SHA51294fd76b5889c0fa2f890f79c0cef875d523ee215d026158111ef280e3429ad6130b9ef71e7c04475de8600f94afaab08a7b51c3ca863bc403f01d96ce947d1ce
-
Filesize
2KB
MD55bad98a1fec02089f0cdb251ff6ed50c
SHA1902ab8edb3f663d1edc44bee8ab9867208b913ce
SHA256b5d43a7a6f07058d2c7ffe20c9fe515d9297e4e409fbd2c0a862c36dd3b3a367
SHA512c1bef079e7b19da2dfba7dceff4f7795951603a2773bbddb1a3d75250b3951e9049adeb2d3d7e69eb80b404a0db5092bf8db693227fb20918202702631e32716
-
Filesize
987B
MD53babbdb9f64a0e07215e382da98f0300
SHA1425dd0a960b4293c9335bc70b810779f349aafb1
SHA2565b3acccff1a7944139b88c5548c8d388ec6e7a6ec3f878e52ff4b4450d0ec114
SHA5120689d34d8f14c1952d1ee287623f0dc62a3f664b303a59904fbbaa3e37f04b73239b6877016d338ff9dec453028c0dce94c63a4e8a810cebf58dab86b62386d6
-
Filesize
2KB
MD5c73bd7c0f07d902fd95f04b4c6b61f12
SHA1ee19f26b411eb113068b205244e24b4f8cc1f9c4
SHA2569675bab42bd166addd1af00db978414313c6c9361bd11d58b49271c8babf4e0f
SHA512da36527151d93a580fddd484b89e2e4dc51be7384ccd30aeedf1bb47d084dee67564256c03ff038d04bffdf1b8c1e413778695579580f3f2109d1a53fe5a3045
-
Filesize
705B
MD589dd16a1117d33352f47daa27b9819dd
SHA12208280b300dd30e2652381e7aa0def973caf64c
SHA2561e7401d59baba07ea9d6165839b628323ee7e49935ab062ee14061c8cf984335
SHA512ac0999c0e1f2641315a88ee72d0d73fd2282255bf0b7d1e0e1c5e81aec16ea5893cf53e28faaa1ffd649c4bc23fa5f259da87538bfcc0f3d45f2efe92a2f1654
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\dc65cb5a-9d0f-4d62-b2d5-f313abfd4a56.tmp
Filesize1KB
MD59fc807fb61f0adaa4ada8728b2054045
SHA1ad7e4ddcb6b1349a9e7e709040b8e707cd6286e5
SHA2565fa56121e06a4b87cf7c5e2016f3cd8d44ffcbfcf347e2c31421d8be5fdf4adc
SHA5128f5dade28282aafe9da26756a9ad7f6cadf62e096d385fcaad4b9ca007894149814bc459a4bae9f8d856d1cd56fdab31bed86cfb2e8893539ca24111698f9534
-
Filesize
6KB
MD501fd147f502f1cd591fda2d4ac1383a8
SHA1f0e1181cae2d866dd121f20d6d8931aa8aefd771
SHA256adaea88d1ac8d11e264f6ed8d18123582f36715a13a0feffa4e833d63d33bbb5
SHA5124e72ada0772de18a64165be54733a8fd275c7f946ff0de05b79df38f67961e408cb7f092e71ed452b6f1987a4f86494c3c2d894e986770fd218df6b47fe430ff
-
Filesize
5KB
MD55d492253ceeaa494e747d6a34faad73f
SHA1bc148957f90646e7fbd35f985062de2d9666d16d
SHA256829db7f80e870e6e6dde0ce3beb174ed2cb713dc49d8788364f30c2edf023147
SHA512b2424323497a9fa3b115912cb9480c536c2f64a67cf2eb732f6d35a357d3b23ee0a47ea9f66be0fa8892f4682668e8433b54897f776630c7014aaece5bacb75a
-
Filesize
5KB
MD5c9194dc97ed87ed20f0b1f1e8663a077
SHA1a28d892db44589a640a01f8e958b2e0c152b36d9
SHA256dfcc7d43e15e7df6a84b8b8d985d9bed31eaf9cd5403ad43cbccd59a7edc1267
SHA512acb4c33f6b5433c03aca5d066765a582535b8fc714d4ae60281eb8dbad908e67ea2253bf5d512401db60b685f2eef613085961e8933b48dd2fe74af73f819939
-
Filesize
136KB
MD5faae3bc4a4c4e6878db67d2858b5e0db
SHA15d4e26098a6bafe340dc3307ff55d47d2b9ec442
SHA2567bc1994e056704799b79eb7276b1bfb909e32c228d0efa9feeb44c1316fd6e62
SHA51233492d2fb74dd606ffcc8012206fcec1b65eab476c59105139fe974fd4c7c42c6ee8444745894cfc78c24b3d4b24f36cbac7a50a62ac0e4f260ef58e5482e2ec
-
Filesize
93KB
MD5cf741930ebdd00f1ca873ab3fa47aa0d
SHA142069b06c3199fe8ca928f3f41263c4d5b06544c
SHA25668f39bef546a12982dd9f97e864392ba5d907ef1221003faa99862af4aa3dfa0
SHA5123ee1f8c0227a13c2b387907fa33070b86f73aef8a0ec2fca1f7d22a1be34e8accfc194c4e86603c2819b039c4c52e8b745861dd99d61a51490e7633d3958093e
-
Filesize
97KB
MD5fde15f28b0ae887d81bcd523329fd12d
SHA1dd0f91dc4e647df362086fdcf536ee728c439f72
SHA25651126f1e1358dc73defb582f180bbb419e5a3e352296c29bb3a3eac2dd9c8145
SHA512a61b0b633871f19601e3dd97fab1b5964809c289fd9d2959b7cc76f030d8e22d15e2d1eae97986a87ca0436f3da7c017a0147f369615f2d735d24ca6aa826b56
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd