Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
503s -
max time network
506s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2023, 03:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://3A%2F%2Foperationbile.com%2Fnew%2Fauth%2Fsf_rand_string_lowercase6%2F%2F%2F%2FdGVzdEB0ZXN0LmNvbQ==
Resource
win10v2004-20230221-en
General
-
Target
http://3A%2F%2Foperationbile.com%2Fnew%2Fauth%2Fsf_rand_string_lowercase6%2F%2F%2F%2FdGVzdEB0ZXN0LmNvbQ==
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292925062990198" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 804 1804 chrome.exe 86 PID 1804 wrote to memory of 804 1804 chrome.exe 86 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 668 1804 chrome.exe 87 PID 1804 wrote to memory of 4416 1804 chrome.exe 88 PID 1804 wrote to memory of 4416 1804 chrome.exe 88 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89 PID 1804 wrote to memory of 208 1804 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://3A%2F%2Foperationbile.com%2Fnew%2Fauth%2Fsf_rand_string_lowercase6%2F%2F%2F%2FdGVzdEB0ZXN0LmNvbQ==1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd244f9758,0x7ffd244f9768,0x7ffd244f97782⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:22⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3328 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5016 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5164 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5028 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5516 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1812,i,16638570719038705721,5515154273391794439,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c4f86191f5638b986018f41cc452e0fa
SHA1b207112c7fe2fc31ad7e877f54b1770941d36de4
SHA2561ed987e31d5411e341a2cf362051163bc94afa8af591acdee90d23a81f42de6d
SHA51291717331cf7a4d2d2e8d60f76f822fa48d449a90101d34cf5eeea9b765af2a152d4f1b76ef045bf8cd8d7bc50f8624f18122df4700a29896b4a0fd6fa010d3f3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5bc847ad88a27c5e9ce57a6ef97503d13
SHA1b121491f852e3be94a0729eb79fd889a77ee9aee
SHA256be0c2084f22e95856894777df897acc2b54c211b5bcc8f964da9949131049d38
SHA51280baf2aa9e469f2c918002b2156bd928c088229b78c022e99edd2b625627543563e72caf9218aeb3e917df198738eebfbeaafcb80b2491f94ba5ccfd23ee15fb
-
Filesize
535B
MD5e37fb6f5ff09d45e7e4f7965aeed28ab
SHA13173d567e9e571452288f09e483a5b5f52b53302
SHA256e093fe12a8315958ceed39ae57fc52de3ab99acfccd3b41062de230658544a10
SHA5124c196d43e7cbcf012f76977ac5be94596e4336b336b82719e7c468d0a5525714a1357125e8b9e2e63ea6b7f92816629e72dc8a9f528224104af77910e17a8432
-
Filesize
6KB
MD5917f44f8c93e84aaccf9ad1cca8859b1
SHA1112eeed77d121131146909e136a9ac68d3cb9f5f
SHA2566582c69801d93750a7f5ccd16d2d9d18addafa2ad1ce540f0321a38b21ef7673
SHA5120c730e4a38bd4291a2ac601816133b00692b7021c3e8c3d97420d5712aa327afb114b65c185baf5e351c178e83b9a31536ae521f84fd6dbdcc2d78186009f234
-
Filesize
6KB
MD597e9f76e493bdcb51a0d2f45901820eb
SHA10b09b641a00e5ecb2ba0a231e2d82edbd1799761
SHA256ece3236744def33f39f4816b12d260c5d49401000676c80a6768a8c101ba475d
SHA5125408617409870b45d6151cc18c168091553fd14cad96fd52a3a9067ab7f1210955076c7a576fc9cadd0068dee8b4619836b4ebb7acac76b42acdce49e85f9361
-
Filesize
15KB
MD532051f0f8b74bf88149a1cd4b04a500a
SHA1acfe88bfe45eb5467f4f25f9681988cab5c96ea3
SHA2565b2eadee91a84edc183bd4c5ea8930025130a949481714c645aa5ffb89600544
SHA51290ef72e25f1191a02131ac5e42c0111e1ccbdb6acbae49c80ac0e3a0a3ed4e1f52ea559b34a729acf8d84bded973cc4f1aa5b405f9deaa2c24723230b73a622e
-
Filesize
151KB
MD53a2fe925fba2325ddd219ce4e39c0cc8
SHA1aa5a21d1b1b0f94bd842bab779d3e21529e8738c
SHA256c478598596e8bb83930b1e95ffe6059ec1965e1f133f8a34fa2f497454be4f94
SHA51207212b774c4ec9c2e4a8235ad2febefbd7d532665ccbe0445023c8541d776b7f1cac26d5c5571ddcd3a2491b39beb12ad8969a9ebea86687af21f0f7cf7de07f
-
Filesize
151KB
MD52e164412ff7de30596fd051970b169df
SHA1ae632c32c5ea924d9129a67800ba03d6dc53d0a8
SHA256a767fcc4f0c8420126ea28cb414ea528531b2e8829beef1ae8c3d1ec6a072100
SHA51237b390977e16b2c1f775cee851e1d7c6cea3de17bf797cdefba727e322634fef8ad3aaddfd62f4e118db3537c1229e51428e66931feb58e749c77bf7f52199a2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd