Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 08:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anmeldung.fila-bonn.de/newsletter.cfm?D%3FKBN%40%2A%22%2CB%28%3D8%26%2D2H8%28%27Z7U%2F%2DF%25%3A%3DC3%2D%3A%2A8BVO%2C%2E%2B95%25%2FFZC%2B%0A
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://anmeldung.fila-bonn.de/newsletter.cfm?D%3FKBN%40%2A%22%2CB%28%3D8%26%2D2H8%28%27Z7U%2F%2DF%25%3A%3DC3%2D%3A%2A8BVO%2C%2E%2B95%25%2FFZC%2B%0A
Resource
win10v2004-20231215-en
General
-
Target
https://anmeldung.fila-bonn.de/newsletter.cfm?D%3FKBN%40%2A%22%2CB%28%3D8%26%2D2H8%28%27Z7U%2F%2DF%25%3A%3DC3%2D%3A%2A8BVO%2C%2E%2B95%25%2FFZC%2B%0A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487459582499458" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 3724 chrome.exe 3724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2012 4668 chrome.exe 88 PID 4668 wrote to memory of 2012 4668 chrome.exe 88 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 5080 4668 chrome.exe 93 PID 4668 wrote to memory of 800 4668 chrome.exe 91 PID 4668 wrote to memory of 800 4668 chrome.exe 91 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92 PID 4668 wrote to memory of 3284 4668 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://anmeldung.fila-bonn.de/newsletter.cfm?D%3FKBN%40%2A%22%2CB%28%3D8%26%2D2H8%28%27Z7U%2F%2DF%25%3A%3DC3%2D%3A%2A8BVO%2C%2E%2B95%25%2FFZC%2B%0A1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcadd29758,0x7ffcadd29768,0x7ffcadd297782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:82⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 --field-trial-handle=1864,i,1102753785752196767,11993236127991086265,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f9974baefd973cc0ff1781adf49f2eb
SHA186338e487923994dcdfe979ae603823427c5e9c3
SHA256c1684656729ec4fb705a7484db53a0488783a5a6d37a53084466382f0aba8127
SHA5127c6d0ff1175df8a73e0e09efff9dc6d63cb6251426ee00118ca1684ac7c0e534bd8cbeac43851be87989475efa0a285372049fdd426dccc956357ad7c0b0ff88
-
Filesize
1KB
MD5a3f95043cc3314d1e2659ffae16f0a65
SHA127cc4dd8d87d3444847f6a7b9180174a9a5e4eb4
SHA256802eeeb9fa090fc5463d6cd6f8c7e9a9131eab0879459ec9d908ea8ca5eeae52
SHA5129decf76b9c5cd88ecb9e1d7a489d385a0a9e401ee3f0e9d3ea867165499de948017fd1dfd1d1369048f415b36d1bd58e13feffdd857c4c5c4e56744f5f98b31f
-
Filesize
1KB
MD5507f58e6ca3db1d7c783033416e07bf4
SHA11387afcd1702be25f27b68f1f70283af313fff38
SHA25646549cceffb2a71fae1bfb4143aa8b19e014ecc0661d05ad9e04f5c60dbaacf3
SHA512e93beb3ba6e1f23ab168bb2e52aa1f3ac0b6243e97d966728682c1e6cfe3d5acb270d23657492db98cea9880323d39d54ee82fb8ebf35719a811181bd76aca4d
-
Filesize
6KB
MD5a61af8125377e79bea2b89649190231d
SHA15da8e30469f933c68bdba0fc092df7568fd15b87
SHA2568fea2ea7aedd7658d1396598ac8a8ded0c408d7d5668063184a8e9980116828c
SHA5127c9edd4520ec9b92aeb8fa94c84893ff219e2e547006672791def023d28418f8a1f849c9c4669d5ebb7ea5ba46223c7d20791e8e647f97f6f1b7390e2c18ed62
-
Filesize
6KB
MD5c2ea866664ac5b6af8eeae58403446fe
SHA16c4bbb8d3844b0aa236a7a5439977bd73256b35f
SHA2561725964abd7a47ebf928717cd9186e1a1a1c43f05235f790d30b09410cfa00fb
SHA5128fec328770f60d29d214fc1a009a2ff2ef6840688d733ebe84d3b71b95572e65b1e4fd1a4dbddac370b4fcafb19ebff36c5dd7f242d5bdc434ad9b3a5d0fb906
-
Filesize
114KB
MD5e490c3dc4542e253f062ba2d8e137c1a
SHA14e848b61191425f7f8a72367b1eb18cc540ea2df
SHA2561edc2bfa9721dffcca9d99e4b716bb63c93f9027f0d2115795bde653c5501713
SHA512f4e62873facf05890f4ff3deeaedfebb923f73dc918417be42c92d7c68a84c6c362241e58c13ddb61ab7b0b73726a5ff0e539bd7ace4bff9208b37f567c404a5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd