Analysis
-
max time kernel
46s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 05:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://oyekirurgiskpoliklinikk.no/skisser/NsWeyprx.html
Resource
win10v2004-20231020-en
General
-
Target
http://oyekirurgiskpoliklinikk.no/skisser/NsWeyprx.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425128880379743" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1072 2864 chrome.exe 86 PID 2864 wrote to memory of 1072 2864 chrome.exe 86 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 1756 2864 chrome.exe 88 PID 2864 wrote to memory of 4756 2864 chrome.exe 89 PID 2864 wrote to memory of 4756 2864 chrome.exe 89 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90 PID 2864 wrote to memory of 4712 2864 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://oyekirurgiskpoliklinikk.no/skisser/NsWeyprx.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff86f219758,0x7ff86f219768,0x7ff86f2197782⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3756 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3860 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4836 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3884 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3040 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5364 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5132 --field-trial-handle=1984,i,5208402305532246229,8704202661679976853,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1008B
MD52042318bf19b0079db59bce0e7ca00cd
SHA18b50056e86b091c68c88d118140ab2466c354540
SHA256b0f20bd2e62e57a22338644a4e2f2af49eceb88126c74e73c5b5ad0e4d1d62f4
SHA512c627073ae2da6375cfc6a919d0a4abb1481c3f7d7637567caabd78825cfe0c47c5c2444e362c09a0630c438a62488d33fed8254ffc93c95757d38d0b438dcbdf
-
Filesize
1KB
MD574e51070cb1c8e7a89d51aed8f2cd10b
SHA1d17a17352fd98056a8f1c0f324dd1ce37e4ebb73
SHA2569d78f5fa125ade2cfff492448e1d3e7f58961ab323555cb4747adf420ddd5f8f
SHA512c754404883b1f12c1812d812afc4fe2e6f630c2ed4488bfc87e8a89cbf906299374ecd8833027b6267b4d871d7c000d2b55399e3038e27e974a4d14a09c015f9
-
Filesize
1KB
MD5a60d3300dbbe90dad1ef011227577d1e
SHA144e4907f4906964e1456b6d207a4ec51266306eb
SHA256208bcd3d156acd0629cebaa0ab914f5230ae56b613714e293bf09b86e8b33093
SHA51240c1206af32df183f130633bdd22c0d3d213dc4797da345b7cf64b61116c04d6755e4fe267ac6808e41cfdb74dffc6cea0534399de3d93d42584d26bc3919e24
-
Filesize
6KB
MD5165fdc63212443bc71e4a3b453408b25
SHA1499221542c47d0ff1fce800f29042ed547f37661
SHA2565397042a0cd8a9d164d7558a90d033b662df660326ca74c2a53bb840573c1960
SHA512a9ee65a81a3d730a6a41800933ff79ae30ffcccd268a1cc42940a8a96149852460215aafd7acf703016b65993e2396597956fb34c0f1654c9d290fb0c845d99d
-
Filesize
9KB
MD53d718c723946c7923a434c4f1024af45
SHA1dbb457e3fad386741739d65c6c1d75ce0e593d3d
SHA256a393fa374408058161f7f67bf53f6cbd0494ceb62786ab6a6147e46f1c93a8b3
SHA512e9aa2c5c120653f508d0b447de3b86922b57e9f222976b8391ae1e5d2bb87c789f9ab9c1154993084d2362772010da41cbbbd2c2bbdb633309b4c4adb09c743f
-
Filesize
109KB
MD529e19d60bb2b6b4f1ef5a2abdc30b3a9
SHA17aff7c9cfdf50c827d05be95025514a1d6eb04c5
SHA256a051e4d120ecd92a6a9a0887ec7421d90b8585648dd37f388d94dc8a545b1866
SHA51206c4323d1dcd222f5275b13f804b394d48972d187403312f80da780cea012751ffaaa2bfdf810d785fbf299af1b36ec7330a7390e7da1a708e076055be97e07e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd