Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 20:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tassoinmobiliaria.com/56G0/01.gif
Resource
win10v2004-20230220-en
General
-
Target
http://tassoinmobiliaria.com/56G0/01.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133223476050863235" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1912 1784 chrome.exe 89 PID 1784 wrote to memory of 1912 1784 chrome.exe 89 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 1512 1784 chrome.exe 90 PID 1784 wrote to memory of 2980 1784 chrome.exe 91 PID 1784 wrote to memory of 2980 1784 chrome.exe 91 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92 PID 1784 wrote to memory of 3852 1784 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://tassoinmobiliaria.com/56G0/01.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3ef9758,0x7ffec3ef9768,0x7ffec3ef97782⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:22⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4828 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3888 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1808,i,2460608637450465796,15599202881813537839,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c480b1668296228d46d3b8741ce68cc7
SHA1f6db1bd691c896a9dfe5dd7f51ea99036e6bc71c
SHA256902f1e68f5101996e60e57223df3d9461cb940d12bcb23baa2e123e4a96b50e8
SHA512ca47dc7e421922104077e5715e8f499655e5c657531a66a62a326e671a3b5ec15bbfff7151f78eefd7bcf2fc12b617b44ef685862c4b2e72bac9038317a5670e
-
Filesize
7KB
MD511dd024843b71acce5978d70b2101d68
SHA1584f0a22d32c404d3da020bed74ab4bd91209a72
SHA256871cb41f5ca677f7d95ffcb302974882ccf85dc24360b808328d0b5706a58b2b
SHA51260a34060cd4a959ba004b57d529d4ae3a850d66b91368c97436fe7f0441bd7e2e35c55626fa91a390e0de6dd4b5ec36512e7f9b3e80544063e2954efca380dc0
-
Filesize
142KB
MD57e37cdbbac4e321a57f259eba2c30343
SHA1a9c47152c5b441dff854229f6994ef7f0bde3ddb
SHA2562f4274712a526fea3ac78d3a5ebeee0079b6c73bba12d932b5f0b695889f8af8
SHA512195f9b63fba70cc07c510c99bb1c29f1c69fd3e8d346cb107fdac720685a68be503fc09bc0c3b44a8f5ec814e254b21d4fba1cb2ee69f4b9890a945f96a7d9de
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd