Analysis
-
max time kernel
29s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:56
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yleak.click/nicoleponyxo-free-onlyfans-nicoleponyxo-find-%40nicoleponyxo-onlyfans-linktree
Resource
win10v2004-20240508-en
General
-
Target
https://yleak.click/nicoleponyxo-free-onlyfans-nicoleponyxo-find-%40nicoleponyxo-onlyfans-linktree
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608886313164886" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2539840389-1261165778-1087677076-1000\{B625234F-C20F-414C-951C-6B457147D4A2} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2364 chrome.exe 2364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeCreatePagefilePrivilege 2364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2364 wrote to memory of 3476 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 3476 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 448 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 4840 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 4840 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2908 2364 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://yleak.click/nicoleponyxo-free-onlyfans-nicoleponyxo-find-%40nicoleponyxo-onlyfans-linktree1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6ec5ab58,0x7ffc6ec5ab68,0x7ffc6ec5ab782⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:22⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4088 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3420 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3300 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵
- Modifies registry class
PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1908,i,11347176002844808329,1397314963344903066,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5ff1f6662d3bc91a3988f0ac89e08aee4
SHA18aa8bf7084e56ce4d450f8b1678b11044de06ec3
SHA2561b1d8329f83f23cde54b82bde979a52ca72d1cc09d895c2b26bd9dbd1d0df48e
SHA51240b6332efb175a62d994a8e5eebcd131cd7c9cb09db5562d8c7e315b0a9caa5fac7e09c67aaf9e73a3e31cb4c10f180147ae595f4c262b00046481fd4729bc62
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD557c351bd365e9d6aa359cf4f93ee9763
SHA1ee48fcb94632acadafdf383ffb89f8c63b2850f6
SHA2560c68fdcf476efd8f50f25b7a2d5e5d0ad7d4b1955b97037fbcc5d3e0a64f9b35
SHA512305795aa80dee384ae44ee4e0cadbea8c6ced7e513717a4d582f58acfa478dadce538a3fbbb2c9d73b111b912b1f1ff042c30de3ab7c51c7f83f546814229f4f
-
Filesize
7KB
MD5e89e7c799c2d37d130fa36927db67399
SHA108b1ac14a5e16cd47067b91173f28ef35a12076a
SHA2565c8d53ee1fcd2de38af321b160a54f32a74dc4b50c9d87b3ec358ace6d5aa615
SHA5124a2f04851d1efb441581aceafca17adb5b2acfa5ec3e0999fabd56838c1f2042e803f69ac6bb4e6b471478682461dbae2895205fe9782bc2ca06746d2fb0fd2b
-
Filesize
257KB
MD5fd9077df83635847c44f5b3fa297d1e3
SHA1a16a9e4f6f1646e15c30ef345fd0d50ef7fc8772
SHA2566c6bc159777c0443555a7d461c9b0f21b18aec2a5898ffe1cf0e9354f5002205
SHA512e2c42c041d5c8970be8258e58d6f3ed570d6fee4e2ba113bf60184b74299748186862d5d3b605f61523e5d5fc204012591c8ba8188f3b5be2410a7dbd6b7f0e6
-
Filesize
257KB
MD5c6578aa2c4cec80928cc596ef8e0e873
SHA10dd36fea3ca1e5ee40f8a07e09c7e4cb5bd3b7a4
SHA25686b36438753fc6f2922d619d2f0a4717bb8171b4c4997bba42ce8ddb06bfdfd2
SHA5126201fa8c5da385669fcb599b7ffca0dbdf48ce5bb39936ac8f6b35b187ecf4c76015f9498dfedb162cce2bb4bb633dcbcfab43f9648e6fb6a26323554111e5f4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e