Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2023, 05:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ca.funfile.org
Resource
win10v2004-20230220-en
General
-
Target
http://ca.funfile.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133296447502930099" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2396 2320 chrome.exe 82 PID 2320 wrote to memory of 2396 2320 chrome.exe 82 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4100 2320 chrome.exe 83 PID 2320 wrote to memory of 4056 2320 chrome.exe 84 PID 2320 wrote to memory of 4056 2320 chrome.exe 84 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85 PID 2320 wrote to memory of 788 2320 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ca.funfile.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0xdc,0x7ffaf6419758,0x7ffaf6419768,0x7ffaf64197782⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:22⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:82⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5040 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1812,i,6861424518411114253,1754664226056946159,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534B
MD5e542e761b72d6b07fc17ad64ab7254f4
SHA18906d10621bb667832a9861e0d5f509267fe5354
SHA256ca5a2d705341f6aec045214c0074ceb07a09ba91aff868ced4dc9fa58a88fcf8
SHA51215d3c20709187f5e156ae7270f677acfa334733d4732c8ec63d2a314ac31c72e426b828d4d784014f8e7215c4ec176533aaa68210993ecb3d1ba791a02ba11cd
-
Filesize
868B
MD551fb94e23e10ca4bba10bb2bfd8d17aa
SHA1c6a2e36aa97de75420b1ae917daaa6bf574579f3
SHA2563e571bd8c20ad0734765e92cdfc7f93ec6213dc2cbde98c8751670b8b67a97d7
SHA51242644b7268dfa16e06be16759b61e61445f8889bfc5e994c8872410905f9fea8935d6f782053b5daee274968065666c2a774ee139782a1853c1a45f21f5cb783
-
Filesize
6KB
MD5db9f44fc013471f19fa6e5cc230b710e
SHA1471181cee57725cbdabaa6b4d4c990b6682836f4
SHA25699bd801e53b3488865206e82bd15d416104fb0233ff1d0c801dcee9e8ac5b5dc
SHA512962e10e2fe162f119e614266d57c6fd883a79cda2c1085ea6a43e949024c6778cd3e1632790c945c302d083dc298b7da007fbf50d067a6931167ca7ee08ce9d6
-
Filesize
6KB
MD5b37150b4715cca0785a87f0ab0600e24
SHA1648359bff79ae2b25dc44b010d7b949144064383
SHA256d2e33241c538da8cc1744e7b3de04e8e9a047982a14c2ae143f1f9f06355db8e
SHA5128c4e31bf84037720aa3c7d313ee5f79bda33a8c96813bd5b3b8a587930dab0544da440aed5af766f791f56624ab4a9f31f64de1dbe58ab658ec7ea72beb73b8a
-
Filesize
15KB
MD5a7462bf6b5b424f57de81ecb972a5c74
SHA13585a1bec7d2884a9b1b3f7b61670404d9bb9e25
SHA256f0cae89a3d8bf840c42b0116fc086fba966cb48ae7956d4eebde0090afa18734
SHA512abd6dcc37ebb9c567429ba811d82c787e89e4c70446b871ad59f8cc942e3b346985fc8ba96b918996645219a6597eb757d1d0c0b15b1985e4f991bd6f6482174
-
Filesize
153KB
MD51aaf0ed05c73dd18478e9ffe854a7778
SHA15be700b60fc61567a059ef5b1f42b04423ff9c04
SHA25655120644ca8bf7ebbe0cc89075a574eba89767d74ce7868f208ccf7a98a7168c
SHA512b1557b017f562da5b9e92173d1e4b4fd323b29148841100618060658046c4c5f63069ececa061e26d6c207dced0eb03b465daabc5b6d2d02670447ff5ec5cfeb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd