Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2024, 16:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://inpower.de/marktkommunikation
Resource
win11-20240221-en
General
-
Target
https://inpower.de/marktkommunikation
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559454327255984" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4836 4928 chrome.exe 78 PID 4928 wrote to memory of 4836 4928 chrome.exe 78 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 4860 4928 chrome.exe 80 PID 4928 wrote to memory of 3528 4928 chrome.exe 81 PID 4928 wrote to memory of 3528 4928 chrome.exe 81 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82 PID 4928 wrote to memory of 2912 4928 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://inpower.de/marktkommunikation1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd657d9758,0x7ffd657d9768,0x7ffd657d97782⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:22⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 --field-trial-handle=1852,i,14060782656455751490,3438346120712504537,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5d990e337c54eb8b5d672981956bab303
SHA1c80fe5841948e1553a7f138f86cbd7535c7fcb90
SHA2561aec09b9908f3ffc365612a3b4ed064bf629628805736cfd5dce17d08c3802c9
SHA512f704f7e5beef65dcf27b4a043413c38f8d95a1681f1c8dd7a8bcf5f2eb837ede87b801106c12b28a056078e272d5e7d22a9f4206d1aa80bf7cce0c08a26777b3
-
Filesize
816B
MD5eadcc51800cf85adff44d10c4b8c3a1d
SHA14983a6c1edcc65f9961cec8b19fc14200ae6a3e1
SHA256dcf244e2c7ca4ec786320812945f3ad8573986104fd047bf5bd058b99a7cf566
SHA512851ae79d0adda00a8fd8be009ea1d3a8b7b63f23647c229825ac66a892837aa3e3627e83af37d5508a891c563614aed298928948edd6208946aaf653ba75622d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\3726421e-3913-49a3-843c-cdd3391cb698.tmp
Filesize1KB
MD5e2b9f57f016b66899386f45dcf1730fe
SHA155d006e27f88b7217b4eaa68749790d5338ec573
SHA256d6922fbe5d352038753a3402cb531f658e96be4a1f7be1ad3e79d3528a39b4a1
SHA51265964ab576ef03e3a9b6414cc1bf43ab20f10dd399567d20ab1db18358594c7f3f405ffb1e4895b49364a513cb4ef0bd5613ed5d4ae57f47c6c9577984d374d0
-
Filesize
701B
MD5473b89a812ad859f816d98fa41e8e012
SHA1e82c65ad6fbfa5107a6b775227dca38566ebfeb1
SHA2562321ff8cd2cd994c6a734ccec7013938c57ee6c083b3df47145b53951033a806
SHA512283ae5100ae6057f433b6045954bd1d04a37428e9b4fe20ff889f92bb41e450b7ef85bda63e091e9d07b2f36c31c2f553b58b6f70ffb5ce08145e655c13b9796
-
Filesize
6KB
MD5f8be9ff2917c886a4be9cf1fbf3c8d0b
SHA1254652e4db8cff61cc13bd1e84d5ab7a6cd10fc2
SHA25653e61d793abfae6a1e58dad4986075294d07623114e5de0b25848ca567b146b8
SHA512fac7dc2811e16d4cf143af615cb169078e1664cd8228bae654b70ffa602e5dd6a4bbc9ae2c5bcad2abcc24d7ea78d6135563febc56e473fcba9d0bee4b2de4ee
-
Filesize
6KB
MD5f9af86f87f6bd17f084136aad8a2340d
SHA129ccc2c3b9ef1426a9fdcaac4932713c2065be95
SHA256b7092fe4a96cb11552933a61b77f7cdde6310dc83cf322cc89166350b804ad7e
SHA512ef6ce66c8438ef9587bb0d4036bd4fba4a093fd980c8b7ec37640eed7a0820a40c3f4538da747a3b0cacdb3e0285c93b47244bbd02cb98617e20ec4e558d9b11
-
Filesize
6KB
MD509f48d29913529f7396030ac09cd2f7b
SHA19eb294e724b7513413b535a01c2465b7f17da61d
SHA256fb362d9c9c31941b4e0f4783b6aaf64b4ce27ac3bba9d264ea77c110d270ddd5
SHA5128d1fa0703fac0e26e0c7b0cbf0e401ffd5f5412f88884cb509dca882f51ec7bd76b04f4c0c0db87644d0dceabe370ee146b5d9dfb10c81720874d4b114fd6094
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd