Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 09:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://webshop.kbtoolzz.de/profile/index.php
Resource
win10v2004-20240426-en
General
-
Target
http://webshop.kbtoolzz.de/profile/index.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591164128808647" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2928 2708 chrome.exe 81 PID 2708 wrote to memory of 2928 2708 chrome.exe 81 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 760 2708 chrome.exe 82 PID 2708 wrote to memory of 1484 2708 chrome.exe 83 PID 2708 wrote to memory of 1484 2708 chrome.exe 83 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84 PID 2708 wrote to memory of 3504 2708 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://webshop.kbtoolzz.de/profile/index.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f5ab58,0x7ffb55f5ab68,0x7ffb55f5ab782⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:22⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2692 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2700 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3488 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3864 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=992 --field-trial-handle=2052,i,5107271400293844480,315108464757925075,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5596e904808159a2fd7f75e90c520a050
SHA127fc11b0c37d8501bee0ece64f563180fc52bc0b
SHA256dd67744b7bb0f0eedc16ca484aea9168b3471db91e71df902b4dff7766cfafe9
SHA512afdae3837d997236236f8709840cbc340531d9994118d615ba1a42fd4f1b7b4d7c09b71aec7cb71ad9ccf32756775ae7a35c514e12f9dff27a1f77a8b87dff47
-
Filesize
1KB
MD5be530d64a792e590f450d99c7ef050e4
SHA15d3b91ead8c94ca28d35660f6ef93d35d3a614f4
SHA256bdb86331587e053cef556f1e7b9e3ea0a8f3ee68faa0fcff2a84fe1d26930a68
SHA5127b46515a5fc030f171b49042ef17c7c1a4c1aa6a1cf5a4ec4414a2505e061ca6287e2e2fd376395121292cd2dedfc2e9cfc065aa1e3e3f0b77394df9d140d4c2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5025e2c84a2589e95d45bef0ac8de54c1
SHA1af520f6112da790bf3f4fee8cb9f2180792f2bdf
SHA2562b9138bb7a9db1c99486f44610c85ac040195e827fa153ef9b2470e36c399437
SHA51242f199d3a389e3b84f1df7cf635f2475f409807fa00a58c755d739cb6acddfa8f975617d315effa8fe13da9e6b2285afa7a6ddbffc03385c800504a1fc92491d
-
Filesize
130KB
MD5c9f4a82b50311cbb0f75f711dfc20bc9
SHA1badac7ba4545209bc4ac6c005db833353a42dffa
SHA2565742758f48357adcda46b81e396ba0da030699fce875f68b8296fbd91d09640e
SHA5121e6aba20423d176351ed3ee07fec9e87d2f292dd04c5150c3503a25781dc52f1212303020b670995dd6521a955a1d8baf3749534913b226f436071ebafa077c9