Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://work.a-poster.info:25000/
Resource
win10v2004-20230831-en
General
-
Target
http://work.a-poster.info:25000/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4484 ipconfig.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 452 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 388 chrome.exe 388 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 388 chrome.exe 388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2088 388 chrome.exe 38 PID 388 wrote to memory of 2088 388 chrome.exe 38 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1320 388 chrome.exe 84 PID 388 wrote to memory of 1352 388 chrome.exe 85 PID 388 wrote to memory of 1352 388 chrome.exe 85 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86 PID 388 wrote to memory of 2380 388 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://work.a-poster.info:25000/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbf3f9758,0x7ffdbf3f9768,0x7ffdbf3f97782⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:22⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1884,i,13544392412531957931,6109731690181869872,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1076
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4444
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:4484
-
-
C:\Windows\system32\TRACERT.EXEtracert google.com2⤵PID:3776
-
-
C:\Windows\system32\PING.EXEping 154.61.71.132⤵
- Runs ping.exe
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c74c31e7e0af500cb7272ec9fe0535b9
SHA11c5e7097c7b9fc544e73e998da6a6f14261f5830
SHA256b287df284dcb1554a71189ad9637caa0662cf78748cfb283df08e7eced20a4ae
SHA512e964ac6d5328dedb3b2c3b30cd78fe4edd7adc50c6d8e5bde8a5b90e033c8c2a95f8910d3a7a90f62657b421f06b46fcc5f39ad1309b82679db00a474a64ec3e
-
Filesize
97KB
MD5c9a530adad3c7fa012629cf12b640ce2
SHA126e570d5aa8f6b21b79c0dbc2f2542e27165b7ca
SHA256f8d26075d17bcf6e067186dd5dc7549f34452e7147412db267b3358ce9a72c5e
SHA5121acbe0d08b32ec7c4e68b55246ea035312631392b1cb22362ac2d8ae79b1eb8fe59515122685047a66fc1912d5fc5faa01f0043a620d0ced086b119c1d5ba524
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd