Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 11:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://emfa.pro
Resource
win10v2004-20230703-en
General
-
Target
http://emfa.pro
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 428 3984 WerFault.exe 55 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133377835214610878" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 2920 chrome.exe 2920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1796 1328 chrome.exe 83 PID 1328 wrote to memory of 1796 1328 chrome.exe 83 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 2020 1328 chrome.exe 86 PID 1328 wrote to memory of 4288 1328 chrome.exe 85 PID 1328 wrote to memory of 4288 1328 chrome.exe 85 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87 PID 1328 wrote to memory of 660 1328 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://emfa.pro1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffa83649758,0x7ffa83649768,0x7ffa836497782⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:22⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1960,i,5835597786753052359,15549025722703310246,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3648
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 3984 -ip 39841⤵PID:1924
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3984 -s 25961⤵
- Program crash
PID:428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d7e86b1078f7d97057433d6144f3eb98
SHA1d3616cde680d5fddb96ca28efa9f9ff2d8d259a9
SHA256c385f087051ed1b19e864bad634479172e22d5e3240680105cd9a66daa27c9e9
SHA512f6566438121812f546bbe7b3a874461229e1a4beda3ed5ea3f0c16bea6fb30a2d9e18426be121041a7b9179dc68e8d4792b8574038d6da4fbeadc09787400507
-
Filesize
216B
MD5ac8fd7cf3a6eed2b70f40c8d8947b792
SHA1a0420da4389806c02dc634c7ffc163294d012961
SHA256eb1c56cf78896588baa3f7c03da02cfbb3c385bc38bbb9d07fc2565691ad211a
SHA512264340049024acafc65fa4e121dfa8fd7835006da135ca6b9ee56554d4a5610c65a0c9fcd259a9cc626a761144c1db062b7e234279072c81cf29d319bd1581f3
-
Filesize
1KB
MD51c70dfe69ed14faca265eeeec4581ff6
SHA13b2ca8ffa632837450585a8d96567a41262a2bb1
SHA25675cd28ee9d8dc3eaef9293c8a49bd05925950444d266246315c78b57cb2720f2
SHA512dce80b9ad49f72d8beeac3974849b02eae70c9c2592aa8f2400fbdbbd8a3801de2f6b06af691febfa318b6e3bc4d234ff5614a6acb57ccb6ca2fab850dc99d97
-
Filesize
1KB
MD50ef3a3a3ce811415704cb269dc47fb48
SHA1796d3472320c9112a885ce615dcbf20db9f14b03
SHA256d8e3838ebfdb4335a5817260ffaee53a670d0d6b0dfbcb6aeee6ef04ec1572db
SHA512c3c2e9e10de98467b929daad2a4dd0aa9178bd3f3d88598be1dbd528b57d7229cf2b5ab2940ee8e44028c1d21531bdabac01482e61344290998706d5b9fb5fc9
-
Filesize
538B
MD54c131c791bce60bb212ad5eaccc6596a
SHA1548c0581bf5bcc465fb08f48b0677fbc7afe9c79
SHA256a80a258d6f69b72f9063a491273145c4e53a396381d27dc895b92c7a12a5e5ff
SHA5122baeab261e1d09111ae226c7f99078a30612f29a16af0f971a13967b0c0e3c329c28a948129840d9e49418414fedf275b6f15fda17fa327be66ff7b2ce397d4c
-
Filesize
538B
MD533d9ef89761d09d516406820d5d07880
SHA1f70f97f4f05a9632ab03e6c327492624942843c4
SHA2565745272b564c5b010fde13e936bff62548d84032acc25caaf06b0c7073769132
SHA512a293146613a68b9465dad63e9a469df1bdd9ae559c2a09ade5ada10bca995134a95cef196c3e2ac2455917f047a07408f55641cae9a8b1df0a83ae9d7e0b04be
-
Filesize
6KB
MD5fc00fe37b5fcc13e2fab78b9260b8954
SHA1dfff8503765acff131135d2cf2007ed0fb4cd823
SHA2564953345663b0ac1df3fe3be6f2dd97872805f7820be7697741ef7f693bfb417c
SHA512ae8d1d3a2dae4071d4678c60cb39a371ff084785b8bc38678ab161869d05555de2f2c32ee16168d145ace34fbf72b76e6f6993f979caffe6249d83c2a9c6b691
-
Filesize
87KB
MD52b6016ac70bfa150359493741ad9e36b
SHA1087f9c85362cab606312fa6afc6a5c741a9cb5e8
SHA2565fef23829621ccd853d382d5c4e257ea235eae78885fbb14b46e38b790c32a0e
SHA51221216d9849eb39bd6f5b69e750ccc04ecc909c66cab1bad359a8317bffa8cf7ce9c372cefa63c6f86ca5ac3a5c7cead85706b8753c2d601b54d963d1e7ab9f5e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd