Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-de -
resource tags
arch:x64arch:x86image:win10v2004-20240508-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
21-05-2024 18:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eu.cs2university.com/expo/expo/
Resource
win10v2004-20240508-de
General
-
Target
https://eu.cs2university.com/expo/expo/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607901850500949" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2844 chrome.exe 2844 chrome.exe 1896 chrome.exe 1896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeCreatePagefilePrivilege 2844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2844 wrote to memory of 3952 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3952 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3452 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 4140 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 4140 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe PID 2844 wrote to memory of 3236 2844 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://eu.cs2university.com/expo/expo/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3b21ab58,0x7ffa3b21ab68,0x7ffa3b21ab782⤵PID:3952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=304 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:22⤵PID:3452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:82⤵PID:4140
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:82⤵PID:3236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:12⤵PID:3904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:12⤵PID:2704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:82⤵PID:3128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:82⤵PID:2724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4716 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:12⤵PID:3244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1908,i,1762848735409837908,12642112623928637526,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD511ab6f8fb32157a479055b7ebcb6a561
SHA1d8667b6963fd85a5708ea937fc9a067ca894bb2c
SHA2569a18961950cecccfeb69a74cbd2e403f2f81dee682196b31dd96f0a7d4e216fc
SHA512c9fef34a8f929e35c1578fc908e62bad1f207d176e344c9064d703218c3d420dad261a68280233e96975444c476229c09c17cd25e6ba44da12167af9413cbbd8
-
Filesize
240B
MD5cde1dfa95de099d0f6a1acd2f9086155
SHA1c1bb1dc7458c6586694e1a71a712cb56ef1d839b
SHA2568a21a953400fbaa343ce4327bcca784ed62388572002bf9c78a9fdabc725ef31
SHA51225e3d6449144bfde4ec3aec023f1326f0185fe663d3fa47503bc1f2c618d0ce6309726c87cfae04eaf60aca82253e098e1800f2868dcb06466771ef863a66e3a
-
Filesize
264B
MD5f72cea1c8435ac5445a953fd1e8fe2d9
SHA1eb6bd2904a29666b31828be1e094e1e0828d5414
SHA25627e431604ebb8854a72f33ecec345343791cc05c95355c8c424794526beff682
SHA512ac16e2df9b4c1ee3f1caf28a6a04b3e2aa54b382e01ba7a9a4394f11009b91303ddbae8ed6caf8448f45bf3c048e5ab1d66791a5a2740b78dfd32dff15e7545a
-
Filesize
3KB
MD59428ecb26ed8cabdbddd6efab5a329e4
SHA126ad34d695fbabb209b7f60a4a9c6a012c6e0c8d
SHA25640fff7dfa70bb4a4ff8e80dc1479e1119e43f4c89bf3ab1ae16597749a4f2e3b
SHA51221cc596684d0c67c9c0ac8f1b1798b2489dc5d39c61e4f59606be10c6db1c9147a8ed4b3d4e857a839b4bf8e0d356833ac202dfc31c84f48ee41f6dc27f1dcc2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD57d97d9ba5cb7e6923247a11ad6577d64
SHA13dc4287d1ebd9237ea125355ffb1f128546c41b4
SHA256fd83188a834d59dbba38c1742266e405dc4d38b9e304d4e5238afbd6d5c4daf4
SHA51217f33c8c41dd1d66b387c3502d8418c811fd13ff32bbe02aacc4c5b93f58dec368319f060b7ee42fac8c0d44cdc3f8950a9184da7b666f45ce607b95656d0275
-
Filesize
6KB
MD55f24e7a948155ddc75a225993d1d388a
SHA11a5d6230ebb26cb6bb8d2068cde84f39e3f4fc53
SHA25684059e24a2f9d68507d0856df64cd43a38a7a2e7fbeb42a4f1e7df9d6136744c
SHA512fe4c0ce5e8f9fbd5e23598160955150a5436a4ad897576b2efe62ece49f529adb7bb4d54f426cfd03829ccfc976dd9af572601c3a4a32ce95ffc3011dad30cb1
-
Filesize
7KB
MD5eec240fd0144541f23ff5b6e5372f55f
SHA18438d37c8bdb901ae4f7f7ff63500fe3d3595649
SHA256d0d644501a69da0ab62318d5777dd98d79d3ba4260a5b48d1b4cbb7baa88166f
SHA51298a9c086e86f79e47f983232661f10688e83d2fac4f74a3227ad78feef7355886f28d09a7d0c059cf271321b2c52924e35884ef78d83ebbbb4d2100aca3127b9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ea696390-a918-443f-81ba-4224dd6436ec.tmp
Filesize7KB
MD5d6ed53b41690230d9831cf0c2ce69d29
SHA11d527c0ce017868b925f9a9219d9426196850225
SHA2564d2c8015b286f3071fe3ad77997dd482dfa2064b5825b4ee504d699c242c485e
SHA512d8c6fd6f2cbea2f3b4d00d853303094b9eedb25072f04be8f70eda02d9b513112ce8bcec60ad3c26fb6a49ad223308707421637cbc1291b59c50bbc5d7be91d7
-
Filesize
129KB
MD5d668dc8d287b60ecbd0e3afca887f377
SHA1911569e56d435b018f1f8ed3ab4d9770010b7145
SHA256cd82d26a184c1161dbfefd1b2bab870a9a8a4b079bf074af28bf8f6814fdedcc
SHA512f465321c41a5700c7e8ce29d4687cbdebb2020d6c9d6bced396ac08c2e739c5a4c26d4498a6c21ee0b8beabff5b4019618dc69169626baf2fb3effdb65b2b39c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e