Overview
overview
4Static
static
1URLScan
urlscan
1http://tufyavodafone...
windows10-2004-x64
1http://tufyavodafone...
android-9-x86
1http://tufyavodafone...
android-10-x64
1http://tufyavodafone...
android-11-x64
1http://tufyavodafone...
macos-10.15-amd64
4http://tufyavodafone...
ubuntu-18.04-amd64
3http://tufyavodafone...
debian-9-armhf
http://tufyavodafone...
debian-9-mips
http://tufyavodafone...
debian-9-mipsel
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
macos-20240611-en
Behavioral task
behavioral6
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Resource
debian9-mipsel-20240226-en
General
-
Target
http://tufyavodafonedsl.igeschaeftskunden.gkny.fr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133650032594474344" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1868 2896 chrome.exe 82 PID 2896 wrote to memory of 1868 2896 chrome.exe 82 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3624 2896 chrome.exe 85 PID 2896 wrote to memory of 3392 2896 chrome.exe 86 PID 2896 wrote to memory of 3392 2896 chrome.exe 86 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87 PID 2896 wrote to memory of 864 2896 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://tufyavodafonedsl.igeschaeftskunden.gkny.fr1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6a3eab58,0x7ffd6a3eab68,0x7ffd6a3eab782⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:22⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4308 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1864,i,671080195553611659,6320108764252481938,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56e7f0c6a67de93faf27c540f5e5dad91
SHA15efe5945056fff8ac6d7a2177d0fb1ce6bc3d18d
SHA25648dbe9bc3e926b78c4bd3adb008f1b456e8526ffb27cfc58fa98e78bf114e3d8
SHA512dc911991686461558d7c900703d284c86475611545e17b52a627a26201518aa6db3b31fa052d58fa1aa8a72b15db0abfbd9501a49fcc627c43c5d8c7a135fbdc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5148c29762596b4fb2dd5affe07e960e5
SHA1102fb5ff6da492b0d5a74137ea4a07a4d81df8bf
SHA256a61414c6d3c73c5ae18ba231b6f2db3f831027d0d3497a371fa16cbec84d318d
SHA512894ff05fd3e8c9c890e461dd5889ad843f8eb0e01ca2ba4e0c344f8e47beeaff2327f3226677d87c2c8e5156393dec447503c5e55d03e6601c0cc2d60d27aed7
-
Filesize
144KB
MD566026d052ff8ca6e5d385e1590fe10ed
SHA1e263169b48762c01a424814244fcee6b4a7e67ad
SHA256a7573a266522ae3341dcda92fc438c7bfb84843717871981af884cbcbfa2918f
SHA512ec31eb20894b7ee3df2b88ad242db86a7d5e1c1732d4f28540ac1db1a1dcfd2f6e5bf10fe73328582aa08411c73a611931cf709b10e9a0b0df4bf199b5b48833