Analysis
-
max time kernel
19s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/05/2024, 04:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tracking.vuelio.co.uk/tracking/unsubscribe?d=sML_xc6_Jbp0BLHCfMw8KXCbjyQJYstq7B6l8ERh7B_40oub3tzV08HlXoOPi7yD1IeNmPEux8byPBvCeuTEKK2YjMciHnJHcr_LfzMHCNjA0
Resource
win10-20240404-en
General
-
Target
https://tracking.vuelio.co.uk/tracking/unsubscribe?d=sML_xc6_Jbp0BLHCfMw8KXCbjyQJYstq7B6l8ERh7B_40oub3tzV08HlXoOPi7yD1IeNmPEux8byPBvCeuTEKK2YjMciHnJHcr_LfzMHCNjA0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609117240692350" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 540 chrome.exe 540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 2452 540 chrome.exe 73 PID 540 wrote to memory of 2452 540 chrome.exe 73 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 4520 540 chrome.exe 75 PID 540 wrote to memory of 940 540 chrome.exe 76 PID 540 wrote to memory of 940 540 chrome.exe 76 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77 PID 540 wrote to memory of 1464 540 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tracking.vuelio.co.uk/tracking/unsubscribe?d=sML_xc6_Jbp0BLHCfMw8KXCbjyQJYstq7B6l8ERh7B_40oub3tzV08HlXoOPi7yD1IeNmPEux8byPBvCeuTEKK2YjMciHnJHcr_LfzMHCNjA01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcca029758,0x7ffcca029768,0x7ffcca0297782⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:22⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1780,i,11092687639328652359,2788208970347423485,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD56d6a986ffb59476bc7f6354634c392b0
SHA18ff51338b783003df9f84cc75c125586df66f205
SHA2564d85f1a0041da664ba585bddca869cb92dd0ca1dbeb45f5c0bbdbc0574efd73e
SHA5129542dc481d4576e64228fa14fae537a7ae11480b40fef8a6153565afdc3a6c562cda9ceefc7c4a78b1361e0193e0970c0cac61b2d3ab853c1fb3b366e6d15abe
-
Filesize
6KB
MD55d543285c47043536cbfc8facbf60033
SHA19c2f80cfd59fdf44a722fbbe34f18431785f1782
SHA25681f393b9ffc91eb5f2f532bec420f0d3a3b636c53a88f686a05c6fefc3e648f9
SHA5125e00f466ecb8146c31cc4cb13e5c039dab5f36ede1a2475a717ebd7ef4dac30fd89c4ad184417d24d9d66487fee20e707d0d34f22adc6e2b8deaa7f0da9b90dc
-
Filesize
136KB
MD53fccf5cdcd486a83d37b96f967792b0d
SHA147f3e5acf594d1d5ac306088e8e05209c4949106
SHA2566b6f345b0982e94e56fde7ec2c2e138c46d4f4b028294a715942a784b5f4f142
SHA512c05b99fa276e5cadec76990c8a967188991ef98f35bc006118c57d44e2c5e7d2549e00b1e4dcadee69248a60e3372d76d6c1e2abfe2485dffbe146f2951733a9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd