Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 12:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://irevfet.pro/xiidhevre/gugbtugbrd/tyhfhytgdv/Vsrb2j/
Resource
win10v2004-20230703-en
General
-
Target
https://irevfet.pro/xiidhevre/gugbtugbrd/tyhfhytgdv/Vsrb2j/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133334672903126432" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 408 chrome.exe 408 chrome.exe 1812 chrome.exe 1812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 696 408 chrome.exe 79 PID 408 wrote to memory of 696 408 chrome.exe 79 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 4188 408 chrome.exe 86 PID 408 wrote to memory of 3064 408 chrome.exe 87 PID 408 wrote to memory of 3064 408 chrome.exe 87 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88 PID 408 wrote to memory of 1712 408 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://irevfet.pro/xiidhevre/gugbtugbrd/tyhfhytgdv/Vsrb2j/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aa3c9758,0x7ff9aa3c9768,0x7ff9aa3c97782⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:22⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4428 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4448 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3204 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4572 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 --field-trial-handle=1804,i,8948362262296202645,9791090588573493405,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD503afd96ff29c1caf156fa29e202bce78
SHA1852b226bc5d1a90517b4d69505a2a34561bd2c97
SHA256b5126b2d82e8d4a6b80dff915b6b4ad02ce3657cc5f57aedff4f12ef95190434
SHA51206dd988afa8d0deffc8a19df64d77f6886a139fa51b300576d8afd6bb87b6496ab5567e1395f55229244712e357f1b59b9878834a9b2cb9d298cdfb3bd224c90
-
Filesize
2KB
MD56e94bf1009c52b6855313a44e2126217
SHA197b31fdccf95055295e3edfea6ee5525cdc16cb0
SHA256b190954645f916d78bfccc680af64495242a9d94397482a77dd2474f9d398796
SHA512fe1320ac719d0b618119836f35333453fadc58300bd2f6bba2e4c0a5434404fb9e2c7700f3b836a6cd04a50eefb67e041ed286ddf9c9de0dd4d74f3090351e8d
-
Filesize
1KB
MD5c423c86f6e8468e3afb7ff3f1bd2ceb1
SHA1bc01230b83f5414014402bccafc3834a804d1ed3
SHA2560e5db74782b7c906054765f1e5fc9c4d3df3d4210650890449452b06098a8672
SHA5125499772a358aac47a1eacfebbb28eab46c32ac46b73d5c146d9b57090f5965e9241a093393db99c465eedaf9d33b169e9d0027c108f50742c042b315230956cc
-
Filesize
1KB
MD51eb223b1fa9a5812c60db50f6dbd5db1
SHA160a92842265ded481a28ee50910b8c9d94a498e0
SHA256b1f2f834ee5743149c96c196ce16279f154916d7fb5f4293eb73ee9df383e674
SHA512d5b0e53043340bade36e149ede0d9960df26ba560f964187ff77ad1c7ae81f6f45b5b707aa148e92104560c2f977eb87211039ab491fddf7ba52d7b6a828ac88
-
Filesize
6KB
MD5fb98e8e778e6890d305cd626b1b0db33
SHA16b119e42221cea88538fd99bf93d4004adda6314
SHA256174cfc1fba28cdaebd29fa9c10baada21a94444827e6a83bb352f9bc060a405a
SHA512186199a723ddb9b190a915d34bdbf53432bdcd16a1994c63079118d57ca3d2d2143068d755789e243b485514938ae2e15e263a3f53f6147b97ccdb9014372699
-
Filesize
15KB
MD58e00fe04ab68747ce30f6e325618ca68
SHA1585bc62113efbcf65e6e3731d300c16252836e3d
SHA2568197236bdf98d9fd597ae7bbb50fd3d5e4afb02d1b8e2b97626a4ce430a5f081
SHA512e230d0cf68dd82d44aa476a301671aeb4debe7febfe2dabac79bc525b33933bc42c8883a490c456b15b085e4bcef3da44f39591c13784a2a47978b003aaba53e
-
Filesize
172KB
MD562e706a577a3a9e2ffe99e58ce0f8d47
SHA1227a2dd2238efef40b31b975544ce20af0da238a
SHA2560d363ee7d4a18748f669fcc07ed8a2662134960715813ec1f6f5adbac1e81d01
SHA512899f1056a5b2afb21038f903ec493e91d1b68289412711cd2d0f34ddfecca566f5063a1d424744725599664b9af33305bac7b2d1a195f6257d699f67c6db08db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd