Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 10:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ludwig.guru
Resource
win10v2004-20240508-en
General
-
Target
http://ludwig.guru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643037689494282" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4128 chrome.exe 4128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe Token: SeShutdownPrivilege 4128 chrome.exe Token: SeCreatePagefilePrivilege 4128 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe 4128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 1232 4128 chrome.exe 81 PID 4128 wrote to memory of 1232 4128 chrome.exe 81 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 4204 4128 chrome.exe 82 PID 4128 wrote to memory of 3692 4128 chrome.exe 83 PID 4128 wrote to memory of 3692 4128 chrome.exe 83 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84 PID 4128 wrote to memory of 5044 4128 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ludwig.guru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65eab58,0x7ffdc65eab68,0x7ffdc65eab782⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:22⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2280 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2844 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4416 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3120 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4596 --field-trial-handle=1928,i,15744730498973248766,15020030467207328767,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD51a591b89ec08c4887853309e8dedf379
SHA14f8a30ee8dfa0495b03eb3648f7a3ff4ef680fd0
SHA256776d39e940017704d8bc81cbdd52676bacba93286db915c81f25f8819086d7f6
SHA512f1e79dc848ab9c058f50d9fd62059f04904169b77f86e62805ea68637ebff5cb7d01fbbbf2ff2374a2931ba9cef716a9419fa618b246be269411489ade8b79d3
-
Filesize
257KB
MD53b63b8cb8badc9145057ae21f5b68afb
SHA197af9fb3bff0c962c71becc5c37edfe102ba37c5
SHA2567239188b992d1a10ef3d896da1500c7f4e98cb985e4cdd650b30c9c478819842
SHA5127c61963c74bacf800a18e1baec3187f3c295d0dfaa8f0bb398087706938e556d1c2260b25b09bcefbea5b6ae82b9cb14211efbadf981a1894ac61546a4a087fa
-
Filesize
257KB
MD57b0dae201ce56788eac7813c5b383849
SHA12d044997fe56b7f1fd3dfd8a10e18d533b439bfe
SHA256b53ead0670caf9444328031d6b1586baa7765d044f0d22892dda808617396160
SHA51257105ab4557f24c1d41269fc3366c4d5c743b6495b7242b0766ed9548baabd96fdd1b5e5bece0cb80bbffd9d7452ee6f89cf0672aba8a45ef0f8bbde97652dc5