Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 15:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://allgäudubistsogeil.com
Resource
win10v2004-20240802-en
General
-
Target
http://allgäudubistsogeil.com
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676920867713080" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 632 chrome.exe 632 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 632 chrome.exe 632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1044 632 chrome.exe 83 PID 632 wrote to memory of 1044 632 chrome.exe 83 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 2940 632 chrome.exe 85 PID 632 wrote to memory of 1016 632 chrome.exe 86 PID 632 wrote to memory of 1016 632 chrome.exe 86 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87 PID 632 wrote to memory of 2604 632 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://allgäudubistsogeil.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff974b4cc40,0x7ff974b4cc4c,0x7ff974b4cc582⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2068,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3644,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,6896466030617740706,4688797462081050572,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4768 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f9c468eccf5ea08dfdd3551fafa33d23
SHA1b5936dac2195ee26cfd628344f62f6c8c3f9ce3a
SHA2561ff1529e4d78144695420cea2908496bc82bcaa6d31e9c7dee6f09ec4163bdd1
SHA512ccb29c08501c10a59331e798f7e4f941fc996e56cb54316c34605ef3c329fcde26bfba3ae984279e02514e1852b7a74636e4a49959074c75d39d7809f23bb140
-
Filesize
1KB
MD5ddf69ca4d3af918a5c2327f003ab568b
SHA1bdbdbc7a86557f9098c70f116e178cc8ebab4bf8
SHA256039071868939dda81872d7bc6b4db575831daa34b24673932deae1be87667fe2
SHA512283f47939d1dd7c44199dedcf356f52d94f4e27e96e10f00f07fcf2be756f17ff230971d7123aca3b326504dad54a520ffadaa5a6e6ff3c6308ebc550e942ab6
-
Filesize
1KB
MD5a1c7c3f415967a88bfdd1a9124602ee0
SHA100b380af8fc0d33e15c5b52d12f153c3b82e3703
SHA2560349494fe3fec04329eb6d55673c2398a0de99f5f2718b76ddeab582255fca45
SHA512cd9594a76ce6177358ac49242282017ceaefc6aca76740a214f29c066153eb6c896c991919cfa6772dc6ff34061dd4f98057b798a170883f5d6bc5083d7fafa4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5fc7be491811f004bc29077103ba6f6b5
SHA131b7d3b1cc2fb75330f82c98ef000dc49795d225
SHA2566816e14bfa7100fe66647960018f659cdf0e54118afefa39ac9750c201dc29a9
SHA512be01db9e79a05872d0da4ccd81c9c33ca1467260463482fd0fec9398f7ac056fc7f22c30f79d6da4d5acfada8c296885aa2b04a7284a34fc2f47ac14e55539b5
-
Filesize
9KB
MD5755709b4677bb0acad4ba8e0e2b039ba
SHA1b4365e3d6bdcb8038c29b22b41a3f52a430bf600
SHA25603973810b32d9cf74e1fc163b10a9a68300152e9f5057fdf465c9c79df25a66d
SHA51222cac6f4bba65572b2dc0ea5a486c6f8da48dd5d98f9598f8eaf1271efc3e274d7d14cdcc33fb9673acbedf6a7c7b0eb9401090bde7b2636b7acb4d450c224bd
-
Filesize
9KB
MD5c6910226132fb498925d8dba3f0f2752
SHA1ded37c1f51615b378d66d4a805990258d5bb10ea
SHA256517e826e59be4d49c334b052288ed2932ed8aeece4054807ade898c32541b8d4
SHA5124322e60485cfec808ec1f8401d3c954cb47ad08d2e8b312f20cd9eeea7bb3403bc865288dcb44bdc57c6ff6ea33694b06d05d0e360946d03b8dc8d1669b70764
-
Filesize
9KB
MD578eca4f06c29a59751a3a6bf6b2c189e
SHA14c3746b6a0daf7852030e72e493ff097ab46e645
SHA25672278b077ffa03cd6bff0994b2d977d796a56351ab468e623bf4494567ded445
SHA5126c7c24abac051f374753fc01aa7078c4a9a5559779f19df7c6d192b1e37ca9f1bae3a1444c9ab528179fb0106d1ebe9146d5d86755c1c3e4e0c672d5fb6aa105
-
Filesize
9KB
MD5e1f35fcf1f27d034bd3c4400e84631f0
SHA19c0fb3d26c6c1499fbbeb368bf8a6ce3ddf3ff3e
SHA256505e1f71938d8bd9072e300f06b07fc0a6af08a4d0f22afc2d30fdcab8a1442f
SHA5126d4afe188a9dac906dd27aeac9c2ecf776c240667e142c53b81313a52ed07bfbc191891b3484ea700e11b6475cf7a1501b7e1cf1dae81dd785d513adb99a003e
-
Filesize
9KB
MD5f32898737df2c3eec0e7bb2280c9ce4a
SHA14c5b960b6cebd56c6b4b0722a6b578b5f936777e
SHA2567454593e90cf4cbc333a808a2b20ee423e8090a889026b49a0356277325c5211
SHA512f4248b771af983a12b60033a5e72ede58294872c491d3d4ac44ca85a556c15e744d1a7408eee2f4bc957063436f15dd8839eb23962f4ba9d42fbe5326136d4e3
-
Filesize
9KB
MD5187d314233cfa63208b1018f25a24bb5
SHA1331beb464226de3a479658a720f49d38b3e05308
SHA256c6a49c8a3f2a49d6aef2f8ccaa14697f4dfb8b6d74d0152c78adf7fefdb327fe
SHA5123d10bd44c75e70d051d9c12041ae59ceefa616b43ac21361b127844c5dd8a46c9004fc42fb1b41502e5a657c38c317e5cd88adf2e840b52ee622300afabe0531
-
Filesize
99KB
MD570aac2c31938c93030ac0142edb700cb
SHA1cfe38fa8ec516cde24aabb0aae985ab886c016bb
SHA25624e8792484d5a338cb6e14af725e762f019bbbddaa8c0ebe78c764b3e08f964c
SHA5128cad4c111a45732c4df0f07a15e47cf8833841a93c4ce219828cd62ece0d1e7012e0aaca0661085d0dff4ea1fe80bf172e0f392a2f9894adc60459d055ff74b4
-
Filesize
99KB
MD51e7dc871be584a6acce55a5ff73c68d4
SHA14946b2724828e966358f1362678ea56fa4fcd1cd
SHA2569a32510a4ca9fcdab1d539107d5637409cafb4ae94cd1158212e2369443efbe1
SHA512897a8784ad4ca77878488eb7c1c454fd123296461e771c6e8fe373ceb32b70faae9fe7d5452d6e169d1903dce67095b1ee1febb2f0e25fe2bd4c909e663703bb