Analysis
-
max time kernel
303s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 20:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wohngefluester.de
Resource
win10v2004-20230915-en
General
-
Target
http://wohngefluester.de
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133409258067544233" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4520 5008 chrome.exe 79 PID 5008 wrote to memory of 4520 5008 chrome.exe 79 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 5004 5008 chrome.exe 88 PID 5008 wrote to memory of 1292 5008 chrome.exe 89 PID 5008 wrote to memory of 1292 5008 chrome.exe 89 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90 PID 5008 wrote to memory of 5048 5008 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://wohngefluester.de1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa66e59758,0x7ffa66e59768,0x7ffa66e597782⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:22⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3864 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1876,i,7888709100396995462,9194271093885002716,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD575df4316d403a31fbb19743fd4ddac6a
SHA1a4993a3abdf83c08b8f877970a9a8ae965993984
SHA2561454c40f30110d8cc6eb0255e422d6fd3ee0ccc38e2b9d306d106244a040c503
SHA51247a01fb2292301db3ec79413affe548a1b42ea68a08212955b18e6ace8be3742c16abf0eafa70c972182a87cb4283ba1876c330f161f5a62d56b0a930b4f6ad7
-
Filesize
2KB
MD5138bbd71442f1b4f5152d85c18c3f0c1
SHA1ccdb3a8efd32dcdaa5a1613f37429166531f655c
SHA2565683e5b39d1b4014fb1185aba1708b841a2d4d339475164bcb70e03d724ebfa8
SHA512ca15b4b905e9415e306d193be15c1937ed413775cb4d0b39af60e53108063fe4f30ee70f3cdfb1aae3c92a65c52438483cfab0a82688e132920fe48625543ce5
-
Filesize
371B
MD52a3dd4b59c0dabb7c20a1c4cf910001f
SHA1f6069642db56f13294958ca09414f15fc0dc7daa
SHA256747455ecc04085a7077a41b6b9e4173b02cbc512e1a3170edb29c754c2f8d0bb
SHA5127f9ffa72e91637844d8380b3e15c84abed708a4693692d55ce12baeadbc927c8ce49db341abd949adff9a2de45300e1501d526e289a5f283bdc2ab07f63a7c1c
-
Filesize
6KB
MD57451b23bfa6678ff2c3e8724463e607d
SHA1e99effe8301c662fee94c533a3c64219a2b658d4
SHA2562ff792a1aa2f03283c81b7333a98eddfd954a2e2507f4a8524a9ecfdd67eec81
SHA51228839bd2a38e319731f577588805c2705226870837f4f851be82c135dcba1d2f83491eb73dd7b20c47cd1d7736a3d9d3738f5ada758c2d0dc462836921094a37
-
Filesize
101KB
MD54ab8f94ccb1588902c3ba08f69cc2ce1
SHA1fca74bbe9a809934fc9275e01a258c430beb6c90
SHA256a0b7e1cc4d55654499298818d04e213c90389a2175092fe65f13725f9edf6312
SHA512d319fa90857e4f3e6125e40ae1601aa6178490cef7e350929b48668efc966f1e48bd8cc2a3a7e066cfb4eccfc5ea12d91652b992c4ad0086f7a1f4d92bd11599
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd