Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 15:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://fe-shop.ru
Resource
win10v2004-20230703-en
General
-
Target
http://fe-shop.ru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329568318365048" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2812 chrome.exe 2812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2748 2276 chrome.exe 80 PID 2276 wrote to memory of 2748 2276 chrome.exe 80 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 2892 2276 chrome.exe 84 PID 2276 wrote to memory of 1644 2276 chrome.exe 86 PID 2276 wrote to memory of 1644 2276 chrome.exe 86 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87 PID 2276 wrote to memory of 3136 2276 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://fe-shop.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8229758,0x7ff8f8229768,0x7ff8f82297782⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4824 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2920 --field-trial-handle=1868,i,15927522426511607606,6907723583622262887,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597daa9f46dc90c8bc602348ab3ceb5c7
SHA1db43e4b4a2cc16063f4ea8c4749eae93f35985c3
SHA25635b6494e9ba02324a9c335a449513098a6a293920aff9eb57811b3e9c6bfc2bd
SHA512f349920ced1fa05194406caa7dade8a12aed7134b25c7d3f38b10f1a0031a321c9137c7ff3772c0dd89d1c33a64caf32e8b09a4b044040e9c70295ddce4fcf37
-
Filesize
6KB
MD574685e8c6b3e736e3599f28bd89cdeea
SHA1294dc7edb509b4efc0a845ecdbf9e78a6878ac29
SHA256e7e885e70e32966e52bc2e5c8a08e22c088231402d6cade0d26b4e16b49b9ac2
SHA5124c27b3eaa680346f590d2a17700fc8a819ad934d7def09b9cb15e566740a44e405fbebdfd10a5c55642a7468ccf26624bf94636ed0d9f0821a79db66794e4f7d
-
Filesize
15KB
MD54bcb8b543e1af87734651cfa19d66c01
SHA160b9333049c274a893d0563d580b0638e5b0346f
SHA256d05ce32fb38217135e4d0e14b53a4ceea8422af3106181ae2850c2b4b5fb3a08
SHA5124c1c3be8719cb29039f4eae8639bd3f607baf241e6812f094a2bb734011d561827dfae5189689cac9766e9e183e330fe24632fccff1d078953e45d592db2837d
-
Filesize
87KB
MD5dee9265e62e5ecec575e54e476f0cd16
SHA1ee2aa470f6ca7769bb9b914040f319d527c087e1
SHA256217077c44e222473be4891a72a26245aff4cb08e258ed56d6bd764bfd5f78864
SHA512f669c0cc8ac742a4f57fd16a1f1fd7c36a30cd7316a56e0fb69a5f69ed19d12dfb09ba94ebbc9c1b55bc018ff7496526af852463962817db09dabdcb64917ca1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd