Analysis
-
max time kernel
92s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 20:51
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://autoreifen-friedrich-1319541735.cos.na-toronto.myqcloud.com/[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://autoreifen-friedrich-1319541735.cos.na-toronto.myqcloud.com/[email protected]
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 924 3748 WerFault.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133349647700856755" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 5112 chrome.exe 5112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 5112 chrome.exe 5112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5112 wrote to memory of 972 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 972 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 1652 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 2192 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 2192 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe PID 5112 wrote to memory of 4644 5112 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://autoreifen-friedrich-1319541735.cos.na-toronto.myqcloud.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffa5da39758,0x7ffa5da39768,0x7ffa5da397782⤵PID:972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:22⤵PID:1652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:82⤵PID:2192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:82⤵PID:4644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:12⤵PID:4616
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:12⤵PID:620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:82⤵PID:876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1888,i,4744702787470061525,15870359570298165164,131072 /prefetch:82⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3848
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 3748 -ip 37481⤵PID:2480
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3748 -s 20761⤵
- Program crash
PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
240B
MD5f432ffbd49b5fa3727e3edffad44823d
SHA1c0cf1057321916eb10c5ab80cf046fd1947f9786
SHA256d2b83cec154bc370709e4b186b719fb23a5a08629f5e18ceb95e133d24cd7704
SHA5126fd9274dd4def87c047730c61a9349d38d0fcf51fb2a264c3fa118f5c4ced95fa0d593d2b505debca4eaf53fd8318ba27d1a49132337c5cd011d259b8493c645
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD503d45faf3096a38001eeb7aad56989b8
SHA1d9fb1cee1effc370ce7461f4de9e47e5f1ffa155
SHA2564cd12461c82e3f87695f47e029bb427f638da3f626b2d7e4e8c6b9487545d0c4
SHA512a7ab331d841e4a8d85a83e6964cea379966c4f2ced3e13f3dac4c2040475f9156e548c7a13aad42b31e27aec1773b4ee9ae5ca26bd1926f3f080554aa44fc117
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
860B
MD5f5a82a6d0392fc78bee859ea56cb5916
SHA1e490c6f1deb5d64240e11d21460619dd14b42afe
SHA256d8a47f02138ea2d6ef71fc0bb3f8f2d31884af253b072610c53fa186ca5b1f83
SHA512df0026f431ece69b9fe0340efb843c92c027131fe3ef2573798e243e98c52d49c77beceac04a126f4d8e6a58b6d0edcd4304d8da2e7ed8c411ee2e7bd1ce7735
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5763725895537dcd3e02f71357df58535
SHA1ce74997690815a251fbb2cc10d5bab369abd37b3
SHA256ad36182825271981a60cb1d1dcd34b22e73dab8d7bf939039c73a508788b69da
SHA5126db091794d2de90cd28eab75b0282e9074b902f077752d2cf383b67edddf0a9ec2e2fcdd9bf7a13db90618837f7165163422c228242e8f35bad6961a6cbdc45d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5f777373d7cff139fbbe16839e95fa786
SHA142513c4e4204b513a26f1148fb7f3723b68febb2
SHA256d29a9e905b759c2c5fc10fc0577044b280b2f03d5c0672e162d3f67347c9ca06
SHA512c8010247c2b1c53a60f662ce06f42812ed339fbd959ea3b13796b6242e745ca8b54e72ec7c0c716a3cc73b1a861e534b748e023d4c7fd0b0d88d9b52636b35e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD515164e97588aacb52607129722877854
SHA134c2aff344a02f019af911e4ff4156b6b077f5ba
SHA256e6f39dfd7af6750a7761c07a7990b3652dc3e3a992492b51807f9fb5927c82df
SHA5127180ac56d90bc2da70dca7f85215e27edb56b5de8d793d57b85b288f8524250b5a299e598840fb83ccad37a4ac4f4c2c5907ee7cbe480b2e1da9195399fa8a98
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d689f86da034607bd9da86ae52586a4c
SHA1dee6e7317c19eba1e2f49b7b43b9e9239befdb34
SHA256c63bc5f8216a7c646277d49860160060ba91cbaf3e8c1d175f74b0f422b48208
SHA51201e3446c166c109477b4b5e321d35539308e130facb93a5736c8c8e6f7030bb76d328866940c0d583612fe0304680e0f8870806d220ddc4217fd059d580742b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
87KB
MD5ce44aac933e4dad1aba7080a9f110bf5
SHA1183f117f53b836501e44416cb49dfd0a0ad01228
SHA2561c6cd8265bfd54e9020a5811c958f667d5511dcd91c89cbc473fa330cd8d122e
SHA512a5621a8a850fc7a10733314f8fc03f83116da1e690d8cd2b6f9d6279764bf4a54c9f95a456672a8fbd752864730b8c58fd30dcf15a46ed6bb1fab5f73f6e20a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_5112_RHTKXFBAMXAYQSWOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e