Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 22:25
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aouje3nnfl.lanuovabiologiadellasalute.info:8443/[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://aouje3nnfl.lanuovabiologiadellasalute.info:8443/[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133809351544522113" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1956 chrome.exe 1956 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1956 chrome.exe 1956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeCreatePagefilePrivilege 1956 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe 1956 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4704 1956 chrome.exe 82 PID 1956 wrote to memory of 4704 1956 chrome.exe 82 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 5092 1956 chrome.exe 83 PID 1956 wrote to memory of 452 1956 chrome.exe 84 PID 1956 wrote to memory of 452 1956 chrome.exe 84 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85 PID 1956 wrote to memory of 4664 1956 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aouje3nnfl.lanuovabiologiadellasalute.info:8443/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa6df9cc40,0x7ffa6df9cc4c,0x7ffa6df9cc582⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4336,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=724,i,10142418278710229603,11008704730451774403,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b66901394d0c6699deb83e5c89f2076b
SHA175ed2530cd7098e857d0f3f281495e8398be0f5c
SHA256ffe934c1350da6f3e189d58939b4ac664fc7b7a197f233fba5cc4d939852ebf8
SHA5123bf9200e1cea3f0ecaf0400622f061fd93016e5575c662fac45f23d11d175894000f04c6a4800d20814a8ada9c050e5d815e1ea855b5ad4dd1a9bdc2c525cb5b
-
Filesize
264B
MD59904a53f579c465ede953a8bacb2e6ba
SHA1eaf857e95b26ac5b3ed05e0469eb2092c1dbf4ce
SHA256b38d45b8b2cf6baf6595afa1000a45bda2d67dadd3d5e8b012ded09df3d4eff4
SHA51289625a354ffe7e686d1b3a28c38ebdd9dc553592cde37311fb36e5e3e7013bbdd8429bf5b4c83e19684a0e8dfe22301486a28352db3606c6acc58d212ccf1779
-
Filesize
4KB
MD583e43b3c779f883de00f591b23d984a5
SHA1d701086182f8099ed8b7dc295bc94553ea260b19
SHA2565261ca36586941199ea9373757b78b767172f1b14fe5f53f1b4accc1beb1588b
SHA512dffdb281dae8cb0be432e120a5dcffcf6e40a4e58f2686759350cb7a9992642df0406864a43785de779d6595c34f232c5af41d74cc334d761c9837250e2e86e3
-
Filesize
3KB
MD565417bb0607fa751ee8ee8f11aa8ae38
SHA184757a0a6295dca4a05fdd81dd7cdff1b94e5c9c
SHA25617e778174ff5f4eea8bfab653b34176a2b17f95199edcbac26723bae241a1bf1
SHA512f51a36fda11877ad7d2c88943b9f91b24a09531bc01b233ea4ecffe3bcb00767c5452c8b7ea429bb82bfc0cd8a604e813386262b328b15dfc1d6b5aef48af80c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD57bf415e36ff3b38cd2d5a3b5482afa78
SHA1f90314c79e94b0715754dca0b49081b71d196335
SHA2562070888b6dcb453b685b4c8287ae83f407c65c34220577855d12c65b7deb770c
SHA512a68936cd7523e5248096ca84a7fb717bb25bb41726fc31748cb223e3ad627a2ae4d9489e0b4ba4927baa2847d0bfcfd3a57a3a4329f5368b8cd615b77b64a5e4
-
Filesize
9KB
MD50f3e53ba0dce1ce5dbe5b9a0b961f1dd
SHA1b1c6a5720ccdec5d0a9d474c4d922f448054ac09
SHA256ee749c3ac6d8dfcd1526765bc74dbe7cd1c44f34ad1408a697f94b4ee59967c8
SHA5123937376d00ed7155e1ca16bbda37509da6475df80c444022e6519c15c887f48ac9162487da2dd86088e7fcae013d6219f765d13aea5dbb9fcd6dedb61ddc05d6
-
Filesize
9KB
MD5d840acb2ad5b15fd442a2e8d2f9bf130
SHA1a14cc7ddaf62f28d2f48fe9c9ae41c1c6271702c
SHA25618e61ba122ecb8c4b3ea297fd87bb1aeb5a90fac69d2b6d514e5bd2d167558fb
SHA512dad4ccf35063a05577131fada685b2286102c0f3a2052f8124fbebc8f74c4b123bb90036c1f9e6cfb8f00d3d97d4436900d2fa0711c3c367a3a53bc493e5be54
-
Filesize
9KB
MD512c87c2b424aa2d44f293c9f992b1441
SHA12118698075c36bfea36bd992d3e4e63cb4446bbc
SHA2568f552b9c51f03d1f5c29dea38ef1ddd52938ed11484889758ccf31d5104fe279
SHA5124965c139478baa889c5f0b433ac17c1f42b1b024118cc07bfdc5960a1f6690fb4254aa7bcf1d2ad425a3bb4652e56b9277f218b9640e06a96a28a8f0499b62f4
-
Filesize
9KB
MD5a97f6961d91e3f96249b7cf487be2cb4
SHA175785f73af579a5d2f952794b333aeebd2e6e4b2
SHA2569c3f32bd020f8d0e4f38ff694780223763c90b88a42593beb1255a3b372611b9
SHA5120bdd95bff32fd8faad765bc7be5e642c271e2ca425328b51abdf391e61ee77d74756a0df3aa3e3a73f1100896c6d1d46c113d93fe51dfe1ab2258d2d2b851e9b
-
Filesize
9KB
MD5c30043543feccf12b54cba4baab080cc
SHA12ef8b1fdb823d40b318043ac54bc707f5cf8b36a
SHA256eed12a2bc7e67ba1d3cb3c75dd3216f0c9debae917b831f53a32bdaf177a3c20
SHA512459336ef3ab3a956b333175c2588ed126ee20ece817569e313e5a888b45cee5bb1a2683580d452dab0a7066a566e6508ac3453e383c9c70538a791378007ee88
-
Filesize
116KB
MD5e06e7fa362b3a74c2ed4af162beca32d
SHA1bd32f4fc93bd28177a51049a6e933e951be70296
SHA256ddf9903c1f06748f8ecf78234c25d47c2880e18edb4b6db0319123f4392c54ca
SHA512fe8a6fd6b6825c263c22fa6a8945a6fe09850142e8acf2be983a7f41af1e954f5f461fcc95111276d2d1f69db229ebefa458cf7b4e983ff8313d9cfa7eddcd51
-
Filesize
116KB
MD557397a31f7db7c624ab98770ab246e4d
SHA133ad643837e51836c7a5858b58b48724a19d5116
SHA256ea10f46105dbee02be49d35d8dd416bd23a5a02480d777fa163b32b60b7b871f
SHA512e2037e0dd5b23cb585b7e322c366153792ad65c4a89bdc881df3030729552f1bc986c059dcbcd00c1f1b8eff26aa23042b0936dbed3b2b97950509096e1e4921