Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
593s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 22:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://auaccessclaimato.info/Aupay/
Resource
win10v2004-20230915-en
General
-
Target
http://auaccessclaimato.info/Aupay/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397236315008741" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 3928 chrome.exe 3928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1212 1224 chrome.exe 82 PID 1224 wrote to memory of 1212 1224 chrome.exe 82 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 436 1224 chrome.exe 85 PID 1224 wrote to memory of 5084 1224 chrome.exe 86 PID 1224 wrote to memory of 5084 1224 chrome.exe 86 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87 PID 1224 wrote to memory of 4564 1224 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://auaccessclaimato.info/Aupay/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec4c59758,0x7ffec4c59768,0x7ffec4c597782⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:22⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3956 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=916 --field-trial-handle=1844,i,3887361192907668508,15990007951646623537,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5e2c410c47842fc90822c2dca125ddc0d
SHA1a0b41ad4d8517cd00e6eac13dfc2f38e08b9dfee
SHA2560693c971403cad6b5b072e64892ce64431585e8a6583899ffb537e6e1fdffc5d
SHA512b4edd807df887bf157194dd40a0d819ca8d1311970db15fa3ce5c3266b6ba6b3aa7bbb66b35f8b94a9dde10a576e15c3e677e37912dca8c6129a9a1bc59813de
-
Filesize
1KB
MD53fb78b0285c033b21307e44b538a95dc
SHA12ac44dc815294767195ef41f788e0bf721edc9a4
SHA256857546ba9122f3dc5c0d973c099f4f06993b5125443c822ef517465a72f226f7
SHA512a5c58affb4669e3f368e15794d67acf8f3e26a7fbb8f705343c97f2c9f231fed5ece95e3dcb3c4ea46b78fd5057ccd95e530982aaf08ab421c0fd03ad245e053
-
Filesize
2KB
MD5a67e51a8fbb87f596a36ddee406b31ef
SHA173a0b74e96c6ce2be14b749e2484f5a2b5119b80
SHA256b72501200dc31c6851eba1e628878451a4bbd3b0d88728e8d114696c5462edcb
SHA5124bc24397c9aa5bab64384863aec4a3be453a7b549e972a2519771af4f9552c204d50c947f4d5a36306ec25e097254e4ff7290d0f430bf376f5c8fcfd4ad0cb46
-
Filesize
2KB
MD5c0cff6d2c1d3f863df8e60f5a84f49be
SHA102989ccc8d328ec9224670f52a1710ed09acdcb6
SHA25696296fb9dc617a4e471943d1bff84a7abd3e42436fb6ab85f1cdcf36302b2ec1
SHA512d8d512d365697cba33f2b99cb5fdd46b28849846f759ce5b30a9a8d0cd46ccff3ee48788aa3ca4f0a63ee6c8b52c6d0f964e5eb1f67a073358b55ea16a65e80d
-
Filesize
539B
MD5085d7db9990c26e632ef802e5af57433
SHA1ae7e609c120f1214e3039cce8a49e10b09d093bb
SHA2568c37eadd3b6c90293e3f43c3b50893521f8111f1c9d902390f27fb2e230ae20a
SHA512c209b27b933fb67b12314d5167d1f550ec3ce90ef54cb75016f679f93f203017456debed5ef1fefb927a6f28ccb2df27f9bf2522be08e4f7c80e8ff44a52489d
-
Filesize
6KB
MD5dbbdec9849f46fbe78a3fc9ffb87e37e
SHA13a5b43a15e3188c942b89ccd002a415f22941ec1
SHA25673cdd7d9d534becaffd00d5d028dfacfb6024b1ca704db9245fe2c7d77ef4b5f
SHA512ae7e6c147f1a027b2d862bdc105ca8c81a96c7c94471a5d635c5bf4f3d00981b235cb58d31af531474dfb68dd8b0591dc9a23fcc765d78c4cdf0a346325b59de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d07871aa-a842-499e-8108-6a73136ef95d.tmp
Filesize6KB
MD53f9bef36841398a38dfca1182a92013d
SHA14dcac342f729f6c81585a650e23f6463d850bb1b
SHA256bad13c9911b53d7ca04242f425dd8f9309030edb19976d15119ce0c63c2a6c7a
SHA51274004f6d6e7a8624ff4bc19deb93baee9ff7eaa77ebebc2456c42f052e542c1fcf8c82d9a6dd182b3be47b46447665ab902ab6c910d7572801c47eae90a111ea
-
Filesize
102KB
MD5f4eff4a79ca80b4d8a6d5fbcaaf907f3
SHA1f90784b7408cc4da0937aeed28f3fba560e89984
SHA25694925f2834849713ebb068877a1a56f10a0aaaee0c7d248645d6a1a24801912d
SHA512aa98089bf18c679d49283cac66546ee9bb6997877ca08118d42be7c0015610277799ffda4285c71d6b038c3e36092619621504d38fc6528781d3ba742371c510
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd