Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 10:47
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://correo.maureenherrera.co/#[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://correo.maureenherrera.co/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133286213946509834" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 3268 3476 chrome.exe 89 PID 3476 wrote to memory of 3268 3476 chrome.exe 89 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1332 3476 chrome.exe 90 PID 3476 wrote to memory of 1096 3476 chrome.exe 91 PID 3476 wrote to memory of 1096 3476 chrome.exe 91 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92 PID 3476 wrote to memory of 3836 3476 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://correo.maureenherrera.co/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3b79758,0x7ffec3b79768,0x7ffec3b797782⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:22⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5196 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5164 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5176 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5528 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5704 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5476 --field-trial-handle=1812,i,8483730332738983177,13967769480013681282,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD503ae4124c30ef63612ed92875d9fa085
SHA1bc4a00aeda1ae454693703246e741b9668dc427f
SHA256f4c2c689b0f48c34831c77d3232e82ef5aacda1fd379a4a8eb7a4cfbd84f80de
SHA5121d0f68da38fb5ee0337bfd365925366fc4374e0a9d07941325abc7c5b4df72cdc31efa1f36f22e0aa78c4f87a1b7ecb6510042f88149c68a3e229a7fdf934a47
-
Filesize
6KB
MD5807c811afe97658c787b6eff10cd1126
SHA1923d1bc0fc9690067756f37f5f426edb33b35374
SHA256636949037b7b18e86ba6f4a62a1540e0323408bb2243e4a6bbc5d6d29547d486
SHA512c076d19f19bab17ddbf48a04b31ff05934406f5a2b6860c8c0e50a53c067dcd4330448d7245b406fcc7f1a5f9365c78a3fa95c7c8ed02d83f8871cc203d041eb
-
Filesize
6KB
MD50aaff1da7127d611231cf69064439ddf
SHA16cb9759247b47139f0cf9f6acbab6701741f418f
SHA256d2b730e65e4be4688dd6f3a7d27390065120a6a3bc0304457c80b90eb67e4c44
SHA5121fc39d0213dc3aa3942c48269b2fc98b32ce0e80631bf02325f452bd2646dfd4ffacbe46d0a2f798b3cbb1226ec89939182352d067f4a38dff7bda215e37c835
-
Filesize
151KB
MD57d4a8c32843d7f7fac3d3d287adfde46
SHA133fc825b68c890229ad7cf2b94473500b6529781
SHA256bc820552b65c35bbc8c73d995c5683afa3b4fe03ff7b314d5e17fb40d7bfd3fb
SHA5129b0753b46a5de4279ba26fb4bbfe447dbc7343e47d85dcba40f9735e0262da915206652a36aba81754817f3f23938f7a6dd64b26029df29c09549d331f8a3a1e
-
Filesize
151KB
MD5a55fb31870c18773453da28775c0d0ca
SHA10755d705bff6f13998824dce70c922d3ddb0a86d
SHA2560306373b451c589a6a626113ab5f2639a0f7447d137ba77d90b42c63dfbd4cc7
SHA5123effe0a7bb96fec5aab272c6c9e7bda6c468d93dbc70c8bbdb38515d7f814e8a8ec77451e7a901a63341f532a989b12a9c83c7c66a0b4e09aa96f0f0b23a44fb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd