Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2023, 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://abbcpmobile.com
Resource
win10v2004-20230220-en
General
-
Target
http://abbcpmobile.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133284704888185081" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1932 2040 chrome.exe 85 PID 2040 wrote to memory of 1932 2040 chrome.exe 85 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 3240 2040 chrome.exe 86 PID 2040 wrote to memory of 4292 2040 chrome.exe 87 PID 2040 wrote to memory of 4292 2040 chrome.exe 87 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88 PID 2040 wrote to memory of 3268 2040 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://abbcpmobile.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968e39758,0x7ff968e39768,0x7ff968e397782⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:22⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4756 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3176 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3180 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=212 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1808,i,13523716351886686747,6237493834234432943,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50f18a10d764ba9c4a77d3fb3a16b65b6
SHA1307aeb4945b5437a3d8686c252dab47eba5f4236
SHA256c26efc26a753193c766d4669632ef305cd7ab9d1b47f7f2c9f593bc68abff1bc
SHA512217d092d102abe61a0e14f6420993fac38325d4efceea68807e056c881bf4a2a76425ef1b53b9b9115e7bc12573bf1e63a6a790fb58dc8618316e620809d4497
-
Filesize
4KB
MD5ca8a726e637b6ce150a4c5a309985b46
SHA14676253f2dc3d27a6f1a6d646f23a47d9a1ebf72
SHA256cc67301f106f2e2ea01071702389ae348a784e622c62a40e83da54991e514b2f
SHA51225146d50e09ea8812bea5de3a1af1020e28a02140a976564d59e190051079e16b32150a383995dcf8115a9f9c79405ba3f9e55a9f396f8f150c2091024c1782f
-
Filesize
4KB
MD50d6f31ab276eb6901a9e50515d3f7e11
SHA18c52d27a83e59a8582e694befc9cdd9097717be9
SHA256a0d3f5ca6c1ae7582a6b4b80d2a00daf1d9419c545506a825cae89be432d26d8
SHA512e5dee521fe2e107fea23a8923737fdb534bdba29c6384aaedba25f1f6aaaf1eaae71bc5360ee6b2343b3c1dee5d2137b5ac0a316854d52ab6eb28838543c4318
-
Filesize
150KB
MD524bf461c463c28671ee8b6f6d88fe06b
SHA14a55d0efe06504348e75e2152af38b8cbf75cdc8
SHA2569b7a1c7c9fe1d7199c71619502d42c2ddb0df91668c466ae39b223d688089b25
SHA512cac18d2c457c78508e0aafee1c37b9d9cf22cec57a880005da5c93516702f3aba6f66c83f480dda03f203c14cdadbd6ae2b55065c325fb1ef9c955ef1fc86388