Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-05-2024 14:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.xn--protge-rservoir-xmbv.com/fr/storico-ordine
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://www.xn--protge-rservoir-xmbv.com/fr/storico-ordine
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
https://www.xn--protge-rservoir-xmbv.com/fr/storico-ordine
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600856436937098" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3968 wrote to memory of 4836 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4836 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 3032 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 5048 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 5048 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4504 3968 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.xn--protge-rservoir-xmbv.com/fr/storico-ordine1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff994079758,0x7ff994079768,0x7ff9940797782⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:22⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2844 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1596,i,8339466458207136785,8815116302716404060,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987B
MD51651aa5ad40afcffc96c4084f7d8a80f
SHA128ecba27a9065f5695182c055a05753d06d96aec
SHA25606099cd7a375260fa89fbab0535818b03047427e6e7f1bba2ce6a91c49d9153f
SHA5123988cebac6d9c9f31a61a3b7fed7e70b537d47af47a6842ab6bd359ec5fe61426166e12c05f80d6ac6ecd23facb69fb108901793469c3a266f9b8c1a9fb01394
-
Filesize
1KB
MD57d479c7543465ff14392986f1f63ad42
SHA12ebe46777fda873cb93c502180e5b4ac36140ae9
SHA2566555f930d3e2d41ad9cc157ffd64135c44e5abacf855dd63dfb7d692be572996
SHA51275ede5859b8dc75a2dd4c1090f3d1eda327861ee00607f170b1410c85c7c941500543c327c76d527af45ea0342137437b7bbfc97dda14005ae5bf47185999e1c
-
Filesize
6KB
MD560207d0a3c17964628af44237471fb09
SHA1aeb520cc82ce71667736d01a8d33090947beb315
SHA2568044650b0e73edd19f64ee2249018d182c55c8dfe2af3af65d73472dfc5b2939
SHA51224bf53641d9c37bf741e6053322d02d9ae8170b8e88b871fc596d42a33023d62b66f0ba854657c5ee17b5a65e615891213c8b3cf3b73c90db94a751b1a339d84
-
Filesize
136KB
MD547b38837585531da56dbc7cd6e0c3373
SHA11c6f532195088e301e029346a187a1c84f941209
SHA2562dd6732d65e46bddd87ea2aee07f97ef3989c8bb4ae3ce78d3977eefa6e03bd9
SHA512956e71674bca43248da48db2db36d967afa9208493aa5a73b5025846039937e3de648cfff998bc826cc81381c6a7b090852c3514b84c460097efc8cd19f4cc8c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e