Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 09:54
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://8fnk42wcboqmbu48c08r.7jc3ptk.ru/789ijk/#[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://8fnk42wcboqmbu48c08r.7jc3ptk.ru/789ijk/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398500922031715" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4628 1968 chrome.exe 45 PID 1968 wrote to memory of 4628 1968 chrome.exe 45 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 3872 1968 chrome.exe 87 PID 1968 wrote to memory of 2376 1968 chrome.exe 88 PID 1968 wrote to memory of 2376 1968 chrome.exe 88 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89 PID 1968 wrote to memory of 2772 1968 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://8fnk42wcboqmbu48c08r.7jc3ptk.ru/789ijk/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4e419758,0x7ffe4e419768,0x7ffe4e4197782⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:22⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4736 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4616 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:82⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 --field-trial-handle=1864,i,6782792264788183107,1085079630418351657,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD590de53e966d80a2bff2d995b0b606619
SHA1df587b7808bf57035603d8429f04ffafbc53e19b
SHA256aac3e2a489b4b97933674b182fd37c64b7e07d04646981a2291e19ecf659031c
SHA512f14b92d077766b98f30c5b97cee3d71bec6f248c23139ebf37355d8305bcee4000ddf5364c3d3d68212e495998c70b58d5c148562bf733396278045d9821c116
-
Filesize
96B
MD5743adb9b8f25f52dc2c30dd789b48414
SHA1acbf94f97f1f0a5ead198401b5ddf31c13f46c19
SHA256a1a469acd01ae2e0003acda96cb5e0fbddf607f6f4ebc39751dc141e3b8fa4b8
SHA5129ab4884a107ef2e5a37af17e1730abd055b0d6da8425c7b59587095dbe44f50660535376e821594493897ac9bc6594596e1dff598b18f7fbf3963885f4d749aa
-
Filesize
538B
MD572fb9d58fb44de537490dd92cd2934d0
SHA11e0eeeaf5966c9f11e23ce97499bdd3d46931952
SHA2563e1af07e8165cbdc11f6a677a3bdf48f85377ce0aa0bbcab34f982ba7a46687c
SHA5122d462b8767adc22fb46dece07503e0d8e13082b696b36d6219f3acc9e2a4d6d13e6cecc7277a86b4efd76ec14c9508a2df1c8fc7099e048f342ad30ed5f3b4e8
-
Filesize
6KB
MD5926c4db36d6b9f0b334590c968c22dc6
SHA1f880e4acf69f56df149ab5f14ec768b53eb8d089
SHA256aaef5db1f2beb7763ca464b0c081b9ba80841924ae96facdda2d959a840d84bc
SHA512baf7a29adf3ee8aa00b78bad8b5f0da47d0e49c4f67560dc7a3e8495a70d0cb4945cf83d2c35ba0e0e3aa28f5b8e6d997f9f0a570ecf482dfae53b9915574ed6
-
Filesize
6KB
MD5fc10954b71b52c80199b96600f9c890f
SHA1fa65b9e4b099c9058f25fcdcde02906c712ceb89
SHA25630bde5adf612e58a8ee793089fe14362fd4579c0dfff9a47af5fe4b8e819fc9d
SHA5127045b6840b60d92efab5ac91c6c320a51d22d3b4c73a724a6248b5b5798a51838ac77907d9a968a553ac2136441be8190d68a7db8574f169c3c1f29ad9ddc925
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd