Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://studentische-umfragen.uni-hamburg.de/index.php/668682?lang=de
Resource
win10v2004-20240226-en
General
-
Target
https://studentische-umfragen.uni-hamburg.de/index.php/668682?lang=de
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541126704210618" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1516 4604 chrome.exe 89 PID 4604 wrote to memory of 1516 4604 chrome.exe 89 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 1076 4604 chrome.exe 91 PID 4604 wrote to memory of 2992 4604 chrome.exe 92 PID 4604 wrote to memory of 2992 4604 chrome.exe 92 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93 PID 4604 wrote to memory of 4444 4604 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://studentische-umfragen.uni-hamburg.de/index.php/668682?lang=de1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd20599758,0x7ffd20599768,0x7ffd205997782⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:22⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1896,i,8879406865858983915,2464242903648792079,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD54d1b608f144db35a224e7cbaafe2639b
SHA1b1409e6491a4b6916e375489ffb550da86a8c3e4
SHA256d9e684c18e1d32b11588b8201ceb13c61f1a3bb1ee188207b8ee2446eecd6100
SHA512cdd9c478113caf2a2002fbbfcc13cb48f58e048e38dba326f24132ba7520a9b02ad7ddf39afb224eb09a90929d13f1c007a12a7d66d5e49b8247bff10064444a
-
Filesize
1KB
MD58160d8d5d3652c54dbc3933581da10ae
SHA163635ab392a88ed03d91a0a6c8c147cbab926334
SHA2560a74388a609ba9ab5ba8483f05fe015b32aa22efa01d93f8e13a6019418bc8de
SHA512b6d54693629ee06433f646e37bbbbd59e1290fd269ca34d3f729dcdf2691f45fe2122dd129609f519e4922051df11aebaa675a167ef1fb1038f55cf7f8edc2eb
-
Filesize
539B
MD59554d7f381a41978e0f6de7b419f1eaa
SHA1ae03e27927002173ad32d29f671287d2d4adf968
SHA2560690d748e29a5f28def4beff04c95e5a9a4f0e9d3ebe7e5478ef18abaab0e0ce
SHA5129828881f843e8c67998592205c60f511fbbdeeb901f13faf02054300ef21955846bd6da971d30a132cf20023549c8e5c5fdec5ba6234859023cbc9fe911bf7f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\eddce1f2-84d7-4b4b-bd01-2fc0e6509bd5.tmp
Filesize539B
MD5fc6b79853c8aad42d44a6f686e38f686
SHA1b78b5f70b5b73679caba81427b28fa729e12f18f
SHA256a0618ce6d553951fb8d34fd31c38733852dbd1392e0892cccb45759b09a7d2ac
SHA512c0eac47f6fcf55a4acc636b3e7db6f17d48e8898a01f3bfa6c5a1dfabffde89b3c4beb277d89d8c82bbf21e0f48220958acffdda47e7406d2a9a1dff9254772a
-
Filesize
6KB
MD566c4c6b20ea98f712e79cf6b8e90f738
SHA1bf1130e12678caf4aec91de5a26bb4fa6cd11321
SHA25670ecab7a01caae140186916d8342fff72a35ebb6dee8a456d17cfe0fd212962c
SHA5129e2f957dd3a3b50be3767d5a91ed760c22e382226d51414145cd7e538a6b53afa6c3f929647745bea8725adab880956ad2b2c09392c3ad86852dcb058e46e4ed
-
Filesize
128KB
MD5a7eff4a5579fd288abfc32c8ee21d144
SHA1624a689116c6a9e589737afad7d47b0ac5e48f92
SHA25679510ce5e402f702f52694f6d43876a12e96cea2492b8f02b744b34996340fed
SHA5124cfc7cef12c81782b64bfa9545084d83900792b06cdaf6e00795b855ea19e0ad0207dd3bbf4d1ddf9a00bbe6fabd95b193de77495a6dab60c27cfaf745057cef
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd