Analysis
-
max time kernel
120s -
max time network
108s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
14/07/2023, 12:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://accountingbayernuge.com
Resource
win10-20230703-en
General
-
Target
https://accountingbayernuge.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338125456931077" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 chrome.exe 880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 5112 880 chrome.exe 69 PID 880 wrote to memory of 5112 880 chrome.exe 69 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 352 880 chrome.exe 72 PID 880 wrote to memory of 4644 880 chrome.exe 71 PID 880 wrote to memory of 4644 880 chrome.exe 71 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73 PID 880 wrote to memory of 4640 880 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://accountingbayernuge.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9c8ed9758,0x7ff9c8ed9768,0x7ff9c8ed97782⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:22⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3876 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3136 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4020 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2156 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4084 --field-trial-handle=1760,i,1672545058706849423,127064986644311601,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ae1489e780de988fbceb7bebf8d309cd
SHA1d87fcde95485c2b3c10239610ab73bdae625a394
SHA256b60624b2bb655ce11676888874e1bf9fb05b8948923071d088ee5d2e68a1a819
SHA5121507368c0222882b435e0de1877c7f3d33e62d3fcd7e4094003c0c628fb4bf518af04fa9d1e3207d66a0c913ea9d38982e954e0192be21039e8439e91f163981
-
Filesize
5KB
MD52b849e0625e4fa4efb78ee18e7c9bc46
SHA15507e27ffcdb51952c43f61db6df2a6c4da2111c
SHA25630200877fe22f621194e6bc1e1dd95a2d2619dc40fb058c70872953db7033dce
SHA512b851ade6ca00922c39921587ebf6634e5f95b9838d628920e59b6bfbc8c33251c3304f8e1007f90e9cd1a3bff58d05a936eeb63eb88beede2b900b940757b4dc
-
Filesize
5KB
MD5c7e7129c95cbe3be677d2773ed66090b
SHA1173be92e640891f5437c1635018a5e2218912db7
SHA2560ff8962767a9842ebaef7faebb7bf40acd7789bd16c4dc04a7fb351204a2138f
SHA512f53c5f5041e64748b159a883aa822df73479c6863ed2c1517409233420f2cf20f4eabc14370443c17ec7203563da40fa717e0a6be075542f4d9bc9597d543241
-
Filesize
87KB
MD525415aa158349f05e1d2c5153d2eb19f
SHA16c35d2add29fd4b9a7fd3df86321d6b4ec3dc8f1
SHA256927bb1109af7bd49bd2831a24217174254331d5f343dd187405ad4c68d660177
SHA51249b99d979918f62b577dec4e44e22d42bb72d35125b1a1b92bf512cdb9f63763e0c2a53d7fb5c8043ad5749a284a16ce2b81ba255238064a5460afe062c429b8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd