Analysis
-
max time kernel
209s -
max time network
208s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/05/2024, 08:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://veiligonline-registreren.su/collect/321/
Resource
win11-20240508-en
General
-
Target
https://veiligonline-registreren.su/collect/321/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609278400513615" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2988 1880 chrome.exe 80 PID 1880 wrote to memory of 2988 1880 chrome.exe 80 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 5072 1880 chrome.exe 82 PID 1880 wrote to memory of 2016 1880 chrome.exe 83 PID 1880 wrote to memory of 2016 1880 chrome.exe 83 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84 PID 1880 wrote to memory of 3736 1880 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://veiligonline-registreren.su/collect/321/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd05faab58,0x7ffd05faab68,0x7ffd05faab782⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:22⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4084 --field-trial-handle=1800,i,4403563573399020499,11441131863554150532,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\72ac4b33-4caf-4998-8545-141f04707e50.tmp
Filesize7KB
MD5066208f5e2490c6152f110f6ec1f8157
SHA14fc9279d22b80c7c60d20cc215b03c1ac603d51a
SHA256891900092b56d6428040d6a9d6d8c54d7e1892ed95d56efff937d029d194fb15
SHA512869c0b7a1a3794f969392b36521fae08e008dc05f18dd047304f94cee8fa1b4b7d8d0e58c2ccaa0e299a2f3a1b453d2c9fb81e858729074d335877d496ea8c6c
-
Filesize
144B
MD5df1b3bd88963e84cd50a1291fe307190
SHA11ea7034ea3708285bfa30653f2833e3b484e10dc
SHA256339e07cd6920b4733251d4a37b068faaca490efcc2daccb0707d8a6fae5df769
SHA512e2ae8b5126d72e456147ceb3cfc3c297eab5e6d0a104042748b6e0500ca0d301272f6790879820b1b6fad955e9e533f11a18ff8d5cc3a19fc267b701073e7f44
-
Filesize
240B
MD5ee3bac581c85ec45c102effd0a35b049
SHA11c903e0d99fcbebf16c7e1f455c191f4c02d426b
SHA25605558260453147e95e5c2809cb146421f89b98e6d4f4ed6e6aecb002f9185a13
SHA51294e6faf5d0b28160d8ec5ac7b0e04c78ef42d906fcfa53a20ce4e92540d1bd18db7ab1d5e62e24b23dd15c07c34288094c9e5d77fc9e690c46143232a23d8192
-
Filesize
2KB
MD5e7e0065d6ef63adc19fc44fe7b52e0df
SHA1bb6b739268e1e845f9c1876bb9c622aeefdaa0ba
SHA25655f9998f63eacd608e4a4153cc7734d1433897ce857374a4443d633809cb2083
SHA51278dcc249b5aa23be903e724990a6c045e3b1515afff5645cc5b5e1a413d2df7560a9baa6db3a6016bcc19ae3f7dca9821653cc224e5b9f0a31cd16576c53655e
-
Filesize
2KB
MD511562b155341b53b1802744ebde38ffd
SHA162e3f7d3087172127c07a9b0a2a2d1bc24d601d6
SHA2566606dc7622375b45697743d8445d97e1848395d97567ef274c4cafc52acf5331
SHA512c02103198537f9117acf03f6864efb5a57808cb103852ff40d89923404214cfea2f1e7234b049d0552dd363db33b564e235516b07a09fabbff28aa8491357e1f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD580c50772d4caf12bd4e8907c27a2bd5e
SHA1e32b326725b3f8f1094cda042fe3407de8043c17
SHA25640583a556ec2645912d6129664bb47f1a8dc7fbd5928c64c5a2d602f5242196d
SHA51292266527157e6d45b4b98daa1e8ec3c3b1cb11a50acefcfed4ab20dfe1cb563b6863c7d7865d4acb1a7501b99193727971b48476f7e35ce8838bd4bb05bea737
-
Filesize
691B
MD563b0cae64954fb2ec12780d9e044476b
SHA1143867418be0055a89fd420b6e5684b2a11cd7c5
SHA256d8a41d7f884228a870f33e99a25fd27cd6a3d61f8801c7825e00c33e9fc75898
SHA512dbc1669d94626929a58a038d129b4553fe117cd9d9273853edd30cc74f99d86c7b9d34c52e977267c74b5c7faceff2b94c97b4ea472977b211ad41cbe24a8e49
-
Filesize
7KB
MD5d56ad29d39bde6be78f91ee686995262
SHA1ba708660d567987637e8e242c182843d4aa66c7e
SHA25657d9bbbd93d229194e9b31064d339b01f02fe139b2efaca5dd273384a60f8839
SHA512c948d8f4b70aaa688797fd65f10c3de895d214681000e21b3723ba440f2aae2526bdc0a312ad71ceef8780e3ecf30353ba140a0a38c6c4d8d19788b9ceccb05a
-
Filesize
129KB
MD52fbcd49df0ec700060725a8a99882b1f
SHA19978485ffba5d4fbcdafedb3e9c669349457e800
SHA256242cda9ea26e61bf9ef2103e845acc44361657d823dd36e3dbc70041c09da203
SHA5122941c9e2c602d19e82465eb44f32151d58472db870e751a26cdf8bfd074d97811b3234fbb7b060fe520c5fe6ef512c7d388c5ba758e681a071387835e5894a65
-
Filesize
84KB
MD57131ad8140dd2ac8deb4c59a96bcdf65
SHA13f6a049c7c26dae99ec3f76c85f7b9306ff5fc8e
SHA25621d21828a2ccaf10f043d4088ec835a3262c8f194f015111f90826b948089456
SHA51217b3d3de27da68330d39b99f4de032ed6edd35273bda4d22b086db0d7d0a0e82d2dba466284de2d98d18cbb9220c8fa3cecc84f0b6b8693e436aa0155c9fe752
-
Filesize
83KB
MD5892a259d898b9500decec5caafc9cb58
SHA108a5503d41481ac478d74656b91077e679fff19f
SHA256d063f902e905e9e3e6ede49234cedab51a0517404d198a51a0131769bbd54100
SHA5123dc0d1dde071ad8d90aece4cc5c94dfb55015ef4c2156a3cb32e8a05702682d18bab48300293ca8df9c63e3bb2f33fb6f184169d2cea17340e9a2fc4e045529a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84