Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 15:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://files48534.com
Resource
win10v2004-20230703-en
General
-
Target
http://files48534.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329590745492588" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4484 chrome.exe 4484 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe Token: SeShutdownPrivilege 4484 chrome.exe Token: SeCreatePagefilePrivilege 4484 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3460 4484 chrome.exe 83 PID 4484 wrote to memory of 3460 4484 chrome.exe 83 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 4632 4484 chrome.exe 86 PID 4484 wrote to memory of 3164 4484 chrome.exe 88 PID 4484 wrote to memory of 3164 4484 chrome.exe 88 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87 PID 4484 wrote to memory of 2040 4484 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://files48534.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd4f09758,0x7ffdd4f09768,0x7ffdd4f097782⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:22⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4612 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4468 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2344 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=748 --field-trial-handle=1884,i,2375358284442902568,10429789416296972433,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cd651217166e8312ca8ffa42972f7673
SHA1f91ad8fbae999efd8dcec9f182d06d5b29f81ae8
SHA256ffab4bc7f2ef725f215806a9dd4a6b911babe21b1bd654f88cb9090c67c57ff3
SHA512dc21eea1621f8000e9d0d654d127dafa2f236826aec8e961bc9239ec6b36476c58059125ab18031a95cfd004ba3ef37bae7e60eacbe1b85b03dae6cb78169c63
-
Filesize
6KB
MD5a5abd9e4e3abe38919d87c858858dc57
SHA138f3ccc6c536332443a30dda228b8bad720f884d
SHA256960acffa523451b596fc06086f673c6c13aa42bde1713311f0672ff0931c895c
SHA5129f70a23d0349049707743752a0316c66bee0ec28eb6679617c230e9d8b3bc7160221443ec7bc4cfdda838b9ed416fdbe4d627957ea26e28a55c23f3344429a76
-
Filesize
6KB
MD55e2cb43c8e725ef494921a766b2e57d5
SHA14c8c0ca38728ec590f6c869ccf05024e1ada98da
SHA256b2103b91682002c86691eabfa1ec330ba51e0a541af8a38d2bb204d5a4483b0f
SHA512ed4e1040725acedd94f7adcbe15c2216b796466c32552014555395363b6db2fed289639a38ec5ebaaa0ef38b3441c6c8dde8553ccbb546fe9b7443e561ecff0d
-
Filesize
15KB
MD58e79d9445a034179d934805e16043303
SHA16963851d01d381c18997b896dbf383791cf632f2
SHA256fb606303c4a70b6bd8a9fefa84af680d58eab2d55695a8425277828547ad0c40
SHA512458e70eb57fe8d18124b422815ba4ff27d2f5845c5cca983d4cd42ca9d6e292e6b61ddab314430f96dcc79c127a7d7bfee8ad140ceb8647ad6752f4877490a14
-
Filesize
87KB
MD5526d44260ea93ce9de3e55b75d696396
SHA1dcef8426bd4656678996181d90bec30ad95edc0e
SHA2564441c042d2edb5d47070c8d1c5b125c7e341568e615485fb7a1e406833c3a5da
SHA512fec0ea1c165f53888c37c1ef59b349bd6cd0b00b2f5893b7625288325d69a50e53928758d215ae3d04668acbc2fb8ecd2960126468127485890329bde8968f51
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd