Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 13:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg
Resource
win10v2004-20230220-en
General
-
Target
http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265649984496871" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 3328 chrome.exe 3328 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1956 4112 chrome.exe 83 PID 4112 wrote to memory of 1956 4112 chrome.exe 83 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 3024 4112 chrome.exe 84 PID 4112 wrote to memory of 640 4112 chrome.exe 85 PID 4112 wrote to memory of 640 4112 chrome.exe 85 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86 PID 4112 wrote to memory of 116 4112 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91d19758,0x7ffb91d19768,0x7ffb91d197782⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:22⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4964 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 --field-trial-handle=1860,i,15428466540557890682,17322289379965183396,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e84b6ba0342888f719564645fe4d60af
SHA1be6845bcdf5abf94c09c718b683feddfc160f9dd
SHA256a607c1093b40a10cf2facbc81fb48a3dd2c7bf0d508793ca17d524c13b6ba91a
SHA5120dc6554ce88e8e1e2da46f59d0a658eec9729a6ea09fee69473f90f97b3e3071850b7d65904b40797f41b1071b97db94dfe55b190f37306edac02842a2deea40
-
Filesize
539B
MD5299311b1a0213cc7776ca5156d160bdf
SHA13cce8ae880de8ea3c2579dcc0f73be10d07199b4
SHA2567e9764e1f05be224812a9eafcc83493d711c2d94250d62fa14e30288f464821b
SHA5128ff7c7f5a1d8179d522ec39e0436638e45dc50f919af81f28b49587a5cb7531baf70e1cb721d1d8d1f6e19c82a3f7bfadbadf122f20d82a4566e3c7f7240ef4b
-
Filesize
6KB
MD56744a0576f0852cf0fe31cd33a1dc9a3
SHA1173caad5d47f3c7bd04f3ec8d859ef3cac3535ed
SHA256d26418c485ec7a0285cf05af1c02cb4a0d180b6dcf59789ab5277932402989b0
SHA512fa05e842651e3ab4623f968f011bf2711118bdd9abbd0ed8056fb547d83236880762a038d358a73c8f59eace0a96b1edd8b5a13cb1431240c5bfd58dec8f4160
-
Filesize
6KB
MD5ed0af7ca7fd778e6f734998b011dcb96
SHA196cef14fe6d755a1429c3d1ce050236e4b0add31
SHA256342a6ac55ffcf962920a2003ba67ed2cc67a79aa8e53673c06789773ab630e64
SHA512ed2d6373e1716934b621541ae79e73228af1abbca58f6fe09daca85abd5d427f6dacc615ec1113208227dd7b10dba64312ab06b6c9bdf99c00fd8132fc0fc880
-
Filesize
15KB
MD56d34046b17d302feac3d69ed1fb5554d
SHA1d2a62c566a75e141aaf6df642bd54d0ebc331d40
SHA2561304b0e670b5fa08043111c85410a247f0e5178f9e235d2eadd244bbe73b1cff
SHA5129564f0e05575708b599e4b6469d3038d0af7532bbc8e6cd6ebab61bdf33b30ddd936971998160acb06fc64215ba3531b66503edf1ee1eb322c61882bc65503c6
-
Filesize
200KB
MD5058b4a2a246448f7b9c3c19161bddf84
SHA1e64939f76beda4d7d9d80c39b15b600fcc56651e
SHA256984a33b13d9f271f128ac7a3c445c23051312932cb8cffe02e09100419f3daee
SHA512a69eb98422e0cc7efbde24763af47a8cfe67d55ad38426246ae5078dcab51a231b11bff2cd95eb43a5e2c9e3c11560bbc39e0f008c47cbdc05dfbf54b2bf1c97
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd