Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 09:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.at/url?q=amp/mascarenhasvidros.com.br/sfx
Resource
win10v2004-20230915-en
General
-
Target
https://www.google.at/url?q=amp/mascarenhasvidros.com.br/sfx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395906080972494" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4344 2148 chrome.exe 45 PID 2148 wrote to memory of 4344 2148 chrome.exe 45 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 2896 2148 chrome.exe 86 PID 2148 wrote to memory of 3356 2148 chrome.exe 87 PID 2148 wrote to memory of 3356 2148 chrome.exe 87 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88 PID 2148 wrote to memory of 2612 2148 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.at/url?q=amp/mascarenhasvidros.com.br/sfx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd641c9758,0x7ffd641c9768,0x7ffd641c97782⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:22⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4628 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3264 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4544 --field-trial-handle=1908,i,3581526028536016900,8846195484703524344,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5b1c9d4cba60bf9f25ab3e19124707417
SHA14625df97d0f861443a74a3ceb290862a8a68582f
SHA25666a4c6ce86695af92a7c9f510d89bbe2a153bd11641be5c758fb15745e415ac6
SHA512711b3513c612f4fe97cba2b7899e214b714260704c58825d8ca2d3c7c594c72c3d7bee4b469cf1e9f3688130f48ba95397c8a85f90e78c5c9102e2cb1c215339
-
Filesize
5KB
MD5cefe3b4f2d758c3b1995a656b4576bac
SHA13d20626d170b455cb04b7c8b0ac0a24801656945
SHA256a9494071a84f911cf536310ab8a002bcb52257041c7d191087273bdd9f86f6ef
SHA5124b575c3be997bbf18392edba0d88cc3a82e840690e831d5cedd4d4dc0a438a8ea7156630977f17dc364f3fb54e7f9f2def8f19f74bfd118266fb5795235b4e62
-
Filesize
5KB
MD562301374779cf3ddf58d1f2ce06060d0
SHA1a0c6b76ee6fbba3ad19f6c6ac9dbf9d03d155579
SHA25631e8dc13220c763fc433f25f151ac030fffd5c7736531bf0e02473f1d3ee6b8b
SHA51252ecd260583c2927e3d6bc8fcf1671eb11bc76bd749f4cae8fedf2f751edcc60b4e80e40d0a2c84c0b86a3302d37afe71716a8817f828a722b8b322c5b7597a7
-
Filesize
104KB
MD58a2f9cb934d44783f9ebecd8a6d90522
SHA12e0e33d1dbe29c29321d7b9daad7fb2b87c0b60b
SHA2569a10e2d10fd94fa86a3b152025ad008240471c349bb816031f0e9ff583360392
SHA512dfe5bd3e5b048faff0903b81f6f43653534df64b35259102c3b822b36e05152315bcf0e420186ccd90bb0aa3874570085263a577f72b359b841a883a0413752e
-
Filesize
103KB
MD54cfed423ca58e773e39e90d8eef86d4d
SHA18e043061be084110d9cbbdf32171e4bfaa3d7c50
SHA256636158df37b71ff6fa1ab5f84279c9883a8e5468df98e4ca062b6c2fb781c741
SHA512c18584a06d0c79488d2cb75532864e434cbdfb8582b75d239dbbaee775a2b6161e67ce25a45021e25438121dc78bf0db089df55fbb3f325abdc20c93479e8969
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd