Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 07:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://g.page/kooikerzuigtechniek?share
Resource
win11-20240802-en
General
-
Target
https://g.page/kooikerzuigtechniek?share
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133712030722645329" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2740 2876 chrome.exe 79 PID 2876 wrote to memory of 2740 2876 chrome.exe 79 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 4192 2876 chrome.exe 80 PID 2876 wrote to memory of 2164 2876 chrome.exe 81 PID 2876 wrote to memory of 2164 2876 chrome.exe 81 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82 PID 2876 wrote to memory of 584 2876 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://g.page/kooikerzuigtechniek?share1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80b5bcc40,0x7ff80b5bcc4c,0x7ff80b5bcc582⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2084 /prefetch:32⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2372 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4068,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4652,i,16451991905034500864,8507436888281746026,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD530b4ec563651b786a7d2fe01624fe6e3
SHA1c0302678fd116f1ceed734a91702087431a6a9d7
SHA256c66083497c6b67204c81aeac791e64435fb6a4707fcfbb43035ef419546fe8c5
SHA5122a38bb0c965ebcc8b69e5eba5624856affc0db2ec4467b0eabb27f0d246cd03699054a359ddd464eb08de096bcfd363f61d1a0fa5876caeac0f905531ae8ab14
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD540ff4bd2252e8db31db3dab24d72bb5b
SHA1fed03b8a71998cc8d88b7ab41cdb5b15ff03268b
SHA256a2edf46206b9219245469720bfdc5575903dac29f23f01aea79b33dc733d671d
SHA51209c944c9c4691085e31b595488ca37e220a60dc739c88d231e85109d14677b9df2867d26e2f278c9ada8bd57d4845e889a942005b62dcc1e798aa49294dc852d
-
Filesize
10KB
MD57c2835233f2c2a4d1176e20e69a5ce81
SHA1624135b291df3afe79f76d660c21110bc0f68863
SHA2569b6da0ae411ef997b1795e5dffcd7d5a3629414c3e46dcbaa476089f79857fb5
SHA512548ee028aa6202eb21c8c8344851069184a58a3496f4e797054a822d38c5236942016838c64bc64df946d19b219109677781ab6fbac9c5712b162ea6b175ffcc
-
Filesize
99KB
MD5bad418da201549d831f731c5c97f2a8a
SHA1e6d38c4125c80e0a1671c756b46873d4c5298c9f
SHA256119dd04a309e8dc67e133478e19f8e291a984c12916887aaf21df1225ade54f1
SHA5128386d97298d86c1ae48756bd42dddaf8f08f3d08cfd9d92f26aa37cd1bf727efbf3616cbaa95dd93ff7b7597e1a78b7978960e7e55c425fcf160efa8641eae18