Analysis
-
max time kernel
59s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 17:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://milanzoetermeer.nl
Resource
win10v2004-20230703-en
General
-
Target
http://milanzoetermeer.nl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329660990141707" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3860 wrote to memory of 4928 3860 chrome.exe 38 PID 3860 wrote to memory of 4928 3860 chrome.exe 38 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3660 3860 chrome.exe 87 PID 3860 wrote to memory of 3180 3860 chrome.exe 88 PID 3860 wrote to memory of 3180 3860 chrome.exe 88 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89 PID 3860 wrote to memory of 3036 3860 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://milanzoetermeer.nl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc6879758,0x7ffcc6879768,0x7ffcc68797782⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:22⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4920 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4808 --field-trial-handle=388,i,3948290275511511200,14584083043010446464,131072 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1584
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x4081⤵PID:4548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\74e1db0f-5240-4c4e-b523-cd1ff1b73c56.tmp
Filesize6KB
MD5e9546c550603ce73995819aa6479c1aa
SHA134e3694364fbbac352b4c4cba14bec4becdcf7dd
SHA2567ec004f88d141ef203cae68a336ae20e31225df9c320fbc5739cf772e249dd71
SHA5128867e4b95a90912be1ac646db0ef395c41621add3d2f738bc0dc6456aad61be3f4f3aa2e2642baff1aa472968f8f6ad97b674efe945f764d53bc156884dd9553
-
Filesize
576B
MD5ca0b81227f51fe047fb730b604d0555f
SHA1bedf639bd5a99a7858655425175565e3194c71b1
SHA2565afab4c0ca20a3b8797ffe1150957e305fe775fa63facb92de16581be31a1c32
SHA51234569da82ea591576ac220907ab2289de8fcf79710b07e582ea16d97ac5d0dd5bfc4b8b7bc6b5d510fd07aaa50e399162d4e2a6d0672239962a1171699151fd0
-
Filesize
539B
MD5ba63104c3443ba1a64ccb288807ab26f
SHA1500356bbdc6b1040dca4c28ffe2f24a146d44076
SHA25642d9cf34a6cbd67676a555f59aadb6ebd32cf0fe284d74b297b87d87a4d249cf
SHA51242e29749c46783a3c3d5f6883c2977cc6194c40da1b523906dfd8d21ca755ee88aa7ded5ba802b9a77e950d541fb8f4ef64dfbe6a37a1f16f6d8804b533cb7b9
-
Filesize
6KB
MD510f59bc6ec1f574e446c9d0c585807de
SHA1a8d34ccc51e10062346f348d023c38b25284fee4
SHA25676df186e944f090ceb34586f84d03dea96556f5e32874fa5e56c95d70b4f3b22
SHA5125b69e97278be639b6d48b990d15e9cce722f871db84ac9a12d7f7b107d3c81937ac00fdaea2156baef89207efa3463540538301d651a04603378b6275b33e9c7
-
Filesize
15KB
MD5349337abea1ef50da39ff05cb0b48547
SHA130053498faa533ceebbc5f43c1b71760a7d0e9a6
SHA2560ee545bfde6b9d77be2ca4652a6560f92f5ac5023fce4262f3fadeda786c94f4
SHA512f41cb825901f3d38c7a323067441dd3d0f6ba358ec5756b81a41e85d9613048881eaa9066ba61388f83cb8550848a89c5444c523ebd2e584d51ccc996995433a
-
Filesize
87KB
MD51f86521665c506b9a5d2c63421ce13fc
SHA174bd4af58a8363af9ac732d2d5cc3e9ec546f7d2
SHA2566615c965181a67ead0ef38ad624f92827050b21a349686e574d38af45be0c62d
SHA512a99193cf40ae43414601845b08c3506215d7299ea11136254d8ba7785df44b7cefa607bbad7a7b801703103e0fd0231ec48f8dc37026c02c7e486077ad4e188a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd