Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1092s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 08:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.archons.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://www.dementia.org//metodoatalhomilionario.com.br/.l/WideX/XiW/
Resource
win10v2004-20230220-en
General
-
Target
https://www.archons.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://www.dementia.org//metodoatalhomilionario.com.br/.l/WideX/XiW/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239474177394518" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4532 chrome.exe 4532 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe Token: SeShutdownPrivilege 4532 chrome.exe Token: SeCreatePagefilePrivilege 4532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1284 4532 chrome.exe 92 PID 4532 wrote to memory of 1284 4532 chrome.exe 92 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 2800 4532 chrome.exe 93 PID 4532 wrote to memory of 560 4532 chrome.exe 94 PID 4532 wrote to memory of 560 4532 chrome.exe 94 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95 PID 4532 wrote to memory of 2596 4532 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.archons.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://www.dementia.org//metodoatalhomilionario.com.br/.l/WideX/XiW/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddc1e9758,0x7ffddc1e9768,0x7ffddc1e97782⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:22⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3628 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3804 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3204 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2724 --field-trial-handle=1832,i,4619544953545195507,10874672862409391678,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d0a354e6c78f05bf04242bbbf6d368e
SHA15f7b8f1a98684cf883a8c77d6a6549b51c14e060
SHA2568365283a987725298a718505d5f7d5cbd09ca708796dd71dedc9effd3900b561
SHA51233e6fae18187495132914eb9442fdfd012d3eb94c34a0d4c31406227e9ab25a9c59353a046f9151a92da61ee15031788f122a0e3a62ef81947d71fad7228c310
-
Filesize
371B
MD5dc2cb5816288f53a1fe1dee75b680fcf
SHA1f7b67bdb00802165b320bdd95130fe87688489b5
SHA256a8f7b3e5d52fad8dd91a0e9c66a79208d67b2a518cf7a754b5141e133e671e38
SHA51232386f87f5bcd6da68b62fef6eac070a0017bbb80d306a06901d11610bd225409a5632bee8515cc28de478bd8651227d017a88c07e1a84651cdef94ea24d049a
-
Filesize
5KB
MD58e7e9d7892c25da86ca841dc3dd4765f
SHA143aa4b32f915f0141b253f2a5b785bfb82701608
SHA2568b3b363e29d6b97ceeae9f029012539f7c9f8a345dbb12814729419f678fe013
SHA512bee5f5eb1881c765e455331ff3a15ba450d6a408856da2fd1d2cc570aee73176472f211922b7f16c6d896a3cb7b4b1e87ad02108f7e980c024a59b1ac8f68b93
-
Filesize
5KB
MD5cdba798a513e0c1780df61a699528275
SHA1f60d786caa0da8b8dec020a9f3319d484cf6ac87
SHA256406a6c9d9248508ab90b5d3bfdfcffd677b156bd060c6e09240cffb5d0c3c841
SHA512217813dd60fa33c662d1125d79b3fc00f63364423893f480afecc8a76534d23d8e2a8714ee59f656ccb9ed7d9613ac40e4aed9ec5227e3a366721ef4af6efefd
-
Filesize
5KB
MD53b501c3c7ab18d1ad962377b80df6dc4
SHA14ccc8fa9215d7e8dd55abfd3b447d1e426b6c267
SHA256a94a94b95457f77e2f4b50ecd00fb9afef0f5c386d3eaec5bbde9c5ba0e5b8aa
SHA5122d860e066a64f4d46c02d450b372c19e75f425fd64b4a0a0a5fb85ab108a91c74f3aab66ec7dd7e72bf9f4362fe123ecb7a4ef5b214f62ff5968445c8fa7f69d
-
Filesize
144KB
MD559e7b310095c14e07be162ac6be38443
SHA1f80965d4982307c3d3a9ed1251f23aa8674ba9f0
SHA256156e33256d3ee84cfdfeb374d60b654ea6fa793fee5b40aa48ff6ac59bbd76d0
SHA512a614878c471ff477620c1f3ce50e5960cca050edfe1eb48e3eb4bd6d0b1a241c78acb0e13b9d4479ab358ad45f936e7c278e05903fb3ed59c631dd89bbb9674e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd