Analysis
-
max time kernel
25s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 06:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eud4.adj.st//mafqat/en/c/carrefour-promotion-qat?adj_t=kw5ujtf&adj_campaign=20241119_CRF_QAT_NL_T_BAU_E_TG&adj_fallback=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_macos=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_ios=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&lid=xgjhvcvadvy9
Resource
win10v2004-20241007-en
General
-
Target
https://eud4.adj.st//mafqat/en/c/carrefour-promotion-qat?adj_t=kw5ujtf&adj_campaign=20241119_CRF_QAT_NL_T_BAU_E_TG&adj_fallback=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_macos=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_ios=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&lid=xgjhvcvadvy9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766457627480639" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3172 chrome.exe 3172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe Token: SeShutdownPrivilege 3172 chrome.exe Token: SeCreatePagefilePrivilege 3172 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 552 3172 chrome.exe 82 PID 3172 wrote to memory of 552 3172 chrome.exe 82 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 4576 3172 chrome.exe 83 PID 3172 wrote to memory of 1884 3172 chrome.exe 84 PID 3172 wrote to memory of 1884 3172 chrome.exe 84 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85 PID 3172 wrote to memory of 2432 3172 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://eud4.adj.st//mafqat/en/c/carrefour-promotion-qat?adj_t=kw5ujtf&adj_campaign=20241119_CRF_QAT_NL_T_BAU_E_TG&adj_fallback=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_macos=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&adj_redirect_ios=https%3A%2F%2Fwww.carrefourqatar.com%2Fmafqat%2Fen%2Fc%2Fcarrefour-promotion-qat&lid=xgjhvcvadvy91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff927b0cc40,0x7ff927b0cc4c,0x7ff927b0cc582⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2016 /prefetch:32⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4380,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4704,i,3172244854412403492,5172391844447948567,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57d23208fd938149d05bc180f40f50394
SHA1e31fadc8aa087144d91332333939741fb1b97102
SHA2561527e6704db24c0fbcd24dc5c7d9064d252653fab56e2e024199cfbfad699c52
SHA5121aefc72b49b63a41e618cf22e1216dfe1d6cb40b41877aa4de7c8ae81202dd9d83a7b90980da3fde1e4145583542b93150e5f16a139df2f7468da5f6af929249
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5723df87507599f1653f8e6b5a149755a
SHA1ae5f28d935862d72f93a5845d0c82fb24b59eb86
SHA25633b7840d00a501a93f4f0438afa015346d0845a8e8e019a54e7df3ff530d3394
SHA5123730a08f1d856500300f83b528ded22da1a50205f6fc4c3ad1d4b5cf033ffc85e7079b97183fd872c40820aa9e2c79c36aea9012354f4c38b122c96c077e8ab1
-
Filesize
9KB
MD529e7ed5408137443d84ddc766275cb1a
SHA13b787c7c936a3976c7998c4de8ad2332238f4091
SHA25655f277549182adb93344063d631d85fc6b89bbc1f0b8c5f63a462987948ecb6d
SHA5120695270b5518249c859a9f58867cfa6e91b2efd4ea11b6feaade6bbddcbee6b5cc859fad0983ee43ba49e4e4655e695c24a2db4beafd51c054b8bcdd6252f296
-
Filesize
9KB
MD516e80ae7ac5326f791e132ba90ff82f7
SHA117c3283e9f05776d0e36a50a668971e7420f2a17
SHA25608115091d9a055798576a70a606660028db730dfa7be4a0d13fd7f1045c0d0ef
SHA5124e5f5b3a139196f247e920540bfaa509f08d499ba1ce24d67de6fa01b1f06f19758a0c618860bf04b28aadb75ea9ee500ffea156b7acfe1aad64d5c2bec60e49
-
Filesize
116KB
MD5e0a6a70e8c20c3ad9cb74bb372854d67
SHA1ed86b5d6213545ca300ae38f24376133cd9ee777
SHA256369eed9c77407daf9be6eaf34f37bfe3764246413ee6ceea230c135b36e3da31
SHA51284c19ee0f03dc8774c09b0280330a6c7e667fe9b786a9683135561f974d05b6079b5d774ca2cbfa56c886fa9d010aa9d07ab6ff55466845a901c2d99e77d5c33