Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 04:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://alaynia92256.gemeinde-karowde.store/
Resource
win10v2004-20230915-en
General
-
Target
https://alaynia92256.gemeinde-karowde.store/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410397352678897" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1472 chrome.exe 1472 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeCreatePagefilePrivilege 1472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1644 1472 chrome.exe 60 PID 1472 wrote to memory of 1644 1472 chrome.exe 60 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 3796 1472 chrome.exe 91 PID 1472 wrote to memory of 4448 1472 chrome.exe 90 PID 1472 wrote to memory of 4448 1472 chrome.exe 90 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92 PID 1472 wrote to memory of 2008 1472 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://alaynia92256.gemeinde-karowde.store/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fff06339758,0x7fff06339768,0x7fff063397782⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:22⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5092 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1900,i,6987462078639734797,2360835583988669182,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a28170acbceebfd411fcffd70573b5b8
SHA13fec1764eceeba32cbf6e51e326b5def98650e51
SHA256a5dfeaded41e876f472b8d8b100f11204194d2c48b15fbbe68ca1d6c0b6a5f03
SHA5123d83c8d820ba61b63ff7c7fec363a07db722761dd89afee95d83dd83d5107d6f061d9741e655bcc7abc5d121a4011ebc059adab75329d0d813bfadd0ab59ad80
-
Filesize
2KB
MD51067bcbfffa3e4da3b2894fd98ec6eaa
SHA1192ac32ae24ce9332d6d10d60faa96c50ef9a2e9
SHA256fbd27727eabfffc202bf4aaf25b0f7ac88e69697185fdd0ecd59fe64fb7a3e86
SHA512e1a220846cd7a243ec616993ecbaecbb6e8553528102633152b859e64ea661cc613bf8e49e84d421877f7a814e1b84e0a30b36162de6e64caa081d122493971b
-
Filesize
2KB
MD51428d32c9b633cf76a0118b99586bb0f
SHA1d217abd88ad25b2ee8ff3183d7b2339cee2b902f
SHA2568617ed379c094602d233863f3df05f72b1df7afed97589d07753e5d728f3270a
SHA512180bf8cb875c64f36fad9833e6e8c249f7e0c6edd96e31ca5fa24c8331c28edeb2ee5c38926ecfa52333f6d3213c815f994fa62de405ba204e08c33b821f13e0
-
Filesize
6KB
MD5a62c462218c6a2a9588c3069b68b8a42
SHA15f857355e344fdeb0f887fb56a5712945d3b3386
SHA2568e2d6483215e7b2eefdeebfde67bc72eca465884b4cec2079f2c14d0fcca95b2
SHA512bd00b1eb414c2a5612c8318a569050175f4375523fcc16b83d583749e79b66b2bbfbbd3728797561577d8741a817881dc4bb5a7f7bbc814226d300a3cca58d38
-
Filesize
6KB
MD5a359139e7c2cdfc6573e112275f32704
SHA1a6322d4ddc895bc272f2ac42ad95f2dead682970
SHA256ecb54c68eca57b4260bdadd6572eaf289f4f8ead453124732ec1ac354e12dd6d
SHA5120d0037109d5b96d99f8476d76f8f94edd67a1a15baccfc8221141930dbc96b6f3a9347e4d0d969b214aaca0b6ed36df4b046c79beb610b26bb8fac45c1203d6b
-
Filesize
101KB
MD5aa828a759bafd31687c0e1f191f93678
SHA1bba6e8604642c5434921df604a3a58851c9d9fa3
SHA25616473ff1ec8f6ac5b39a5259fad293ed6c8432799b44711f4ebf01fda3b6a259
SHA5126e8eb020ead700014ccb0ecfcb67b8f01e929d77e26577c9b892eddc4cc514cba29675c73d6ffccd6f7d6bc704e09a6dc0d8bac57e4d83462160246ddae9e097
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd