Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 06:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.goerg.de/
Resource
win10v2004-20230831-en
General
-
Target
http://www.goerg.de/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 720 chrome.exe 720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2420 2176 chrome.exe 67 PID 2176 wrote to memory of 2420 2176 chrome.exe 67 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 1640 2176 chrome.exe 83 PID 2176 wrote to memory of 4204 2176 chrome.exe 84 PID 2176 wrote to memory of 4204 2176 chrome.exe 84 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85 PID 2176 wrote to memory of 3660 2176 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.goerg.de/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e9d9758,0x7ffc3e9d9768,0x7ffc3e9d97782⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:22⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=944 --field-trial-handle=1864,i,15216657944598837959,7388970009116672434,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD55db49fc80f38c8532bae709678acd0a0
SHA16a28512c27dd5f4265ec4a670de23002658f9b39
SHA256f187eee01b96b8c22594a16fe9b6da562bbd262a098c3b154c78ed02aec0ed5a
SHA512ca71ea15bb5998fbc5b1e60efbdf2d52c1aba9b44507ce82987132f57a37048c9483e8950846a4e3b1c225e39ef0ed6ee95e515114e9876f0adb912b0eda28ab
-
Filesize
1KB
MD50d2f22ca743e3cfb4595266618ce2595
SHA1876867bb160dc3bddd5b2fb4f6f0567d2f9ac7a3
SHA2562a05e663486e241d067630589f05070a616eb57ccc66ee79649c192507eaf95d
SHA512304f39f9be13988ed52dd56d8aade5d8776c1fe404b2ba7911ff2d0266e9f0d6a4274543b00d4e87a86cb35218a48a13be5ba3856b4d94146a5bae474f502d45
-
Filesize
539B
MD5721a5cc9c6fdb4277729d1a6589a8d96
SHA155cfcabc17508168b21f0080e2cf561d6ac5d5aa
SHA2564ff5820515180b8b3d8254d556d8affd37e6b969619ccaf35f7491416faf3c4b
SHA512367d9dec631c62aeaf3512509ce8d4d21d5dbb9b566845226a2733bb4f0720ca26f1f6b71a91d7de3990d8a71b8e2ab39e400ee1ad05641bba157bb64afbcebd
-
Filesize
6KB
MD57f03844fe6a2e6b375cb7d5b52bf7e31
SHA16e6d1e6b08b0449277145deec7b0be92d109fccd
SHA2567fd89fa63b3a810973209467bee951340c73022cd9495333045356cdbe320c3b
SHA512026525c8f583db35107addb11a882bee0cf3de8e209d9bd291db8c8caaecf873b50164c954b006d0516a09b2698ee128c5357dce04fd885b6d9a38fd9e5f74e6
-
Filesize
97KB
MD52edd19cc57227c639aa2ff24f129bc46
SHA1a4cb17d35d668b947586a98995865016ca10fb48
SHA256f548d6710fb5ddc26649fe8a997c929732a114d8b7f314f3e326ec49650deb14
SHA512f61d4a85cb3fde7a8106d9c8c253d574a81f5c9c56c8cf983c18c012a6a27f97464104bd3e7cd266763eb2a2bc0bde09d0b4d2064d1545e296ed33353a9ebddc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd