Analysis
-
max time kernel
600s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 05:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://i.otto.de/i/otto/be8e2b29-ae2f-4245-bc4f-e35fccae035a?$ov_email_artikelliste_artikel$
Resource
win10v2004-20230220-en
General
-
Target
http://i.otto.de/i/otto/be8e2b29-ae2f-4245-bc4f-e35fccae035a?$ov_email_artikelliste_artikel$
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289550897087564" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe Token: SeShutdownPrivilege 1468 chrome.exe Token: SeCreatePagefilePrivilege 1468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 404 1468 chrome.exe 82 PID 1468 wrote to memory of 404 1468 chrome.exe 82 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 3296 1468 chrome.exe 83 PID 1468 wrote to memory of 2412 1468 chrome.exe 84 PID 1468 wrote to memory of 2412 1468 chrome.exe 84 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85 PID 1468 wrote to memory of 3820 1468 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://i.otto.de/i/otto/be8e2b29-ae2f-4245-bc4f-e35fccae035a?$ov_email_artikelliste_artikel$1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffb59758,0x7fffffb59768,0x7fffffb597782⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:22⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4804 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3768 --field-trial-handle=1784,i,10173288711067193754,15826992284127084578,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f0eb4a904f3f8e35f7fcac4d9923f56
SHA1467bb1b7b68b70b86e2e5dc4d6a5286fe0703d1e
SHA256f2090b91e09a659db9b682147468cc004e86157de670bcc534b4d8118146d44e
SHA51254b7e7756648b3fca7e739aeda19f6639b1b97a6b93a8e2d41c6ec3f57044412141b0a9b4500494e8777eee689cc5194c0a33049e86562a1c80ff924c9284ec1
-
Filesize
6KB
MD5172db974a279c5062ccf0e2384cd4c6f
SHA18300c54682af623c1ae689ae4886b897ed94adb3
SHA256f9332072439b26799a47df8d150365eb3ac22690f015673f7b7addcb3fa0559e
SHA5129d2954f71e477ad9beca48e7cadf77bfaa6ba20575f1e1b2a016ca9be2de8fbc6884716e67cc01eb5df4f3f1364c679c40b4e5a827d5eec0fd3e8ceffa09999e
-
Filesize
15KB
MD5dd49987c780d1e71b0a52c9eace5132f
SHA1d887a211adbf65311c774f25b9e3b6fc9b71ccb9
SHA256b4b9e2cce455f0d6ad642bdc6278891ee3f37fc8b74470d0d6e0c88a3b1cbe87
SHA51221be1aab78dfb3e2ddb3e1ea8e6874af84c2fd509285cfc2adc96cf845078fe1adde2e7017204b4bedde22e0f5ef9ada1427fb1029f0cccd6ba2fd841f3757e0
-
Filesize
151KB
MD5f6b14af7e9519ef1561712b7ace25b7b
SHA1389793e2789f0211217bc8817ce6a254eec4b2bd
SHA2568133d9c264718b15c04b29f034dd918025c6c9a84f0a665d04df9a1e683750b9
SHA512b2213c140cdd75a32e5958ad26b26b92f7b152a8fa618e8544ab236bfc2c4cf68a2d372dabb2d0084fa43d7d6d61e954bc7d997f47f1a5ad5d63fa8c40a812ad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd