Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://atopaymentteam.com
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://atopaymentteam.com
Resource
macos-20220504-en
General
-
Target
https://atopaymentteam.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415370890464515" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 chrome.exe 1560 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1560 chrome.exe 1560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 544 1560 chrome.exe 85 PID 1560 wrote to memory of 544 1560 chrome.exe 85 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 3788 1560 chrome.exe 89 PID 1560 wrote to memory of 4860 1560 chrome.exe 88 PID 1560 wrote to memory of 4860 1560 chrome.exe 88 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90 PID 1560 wrote to memory of 2428 1560 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://atopaymentteam.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce889758,0x7ffcce889768,0x7ffcce8897782⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:22⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5260 --field-trial-handle=1876,i,10004232695578670444,13632224534844825411,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5022c5e669460122c2cee9929f05fe4ce
SHA141dab6443b3c9da114041af4f637532c8f90621f
SHA2562615f8ac2012d2be60a987bf3364437adb1a04a9ca5a9d7208b1b9b981b19b95
SHA512cdf874169bcac1bded2210503ebabc657877b1d017b6204164486721bb92a6b6b6d3e6757a6446d9d11fd834bd6e93ca95310a22fdaeb3a000c517403a2b6b41
-
Filesize
1KB
MD54716dd4b7094b2e104be61e38c7dfe35
SHA1a9c2ce2cb43bcbcd19cd6df16029bad9d3e33f02
SHA2567e970c51a069d67af8fa69b1680255fce035b17340be47654ae16427eb25d1e8
SHA512c3d34d9495c9776a1ee8e03f452546e73485ba1567deef68a8ea4e561567f1530213834f0820c1493fee7e741793d1fd160d4ec9362e237d1c03f7c51d0d090b
-
Filesize
6KB
MD5d3810c14747b9691d3732d51c36c176d
SHA1cfbb4149fab51135abaeee88508976b7c90e87ee
SHA25660102c990b408472d51b616fa9b5f79eed2be706aa0d23a80f73244e5318cb96
SHA5121ca2ea5d841b9b4418d01615c8da154b54cdca83b0985cd905988506411101365b2f71508cfbb26f161a827d4e0585a0cdb41b173165d55d3f3858595212964b
-
Filesize
101KB
MD5f9273d0488481f8a6ba9cbad68d2f0ae
SHA103c1a676c1b3de2ea7c57aa8a06d305ebcab3816
SHA2564b09c0b2422dcb5846ee90df8fd11e0351eb3b08f81b757e26a8f96de1bfa5c1
SHA5129e0408695b27ff55dea9cd37821e27cb656bf3c33886f736342fff1e26b79aec32c05a516f3d065824a29ef6e9d88c7af98b9693be1f1891b4652dd2367c6e88
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd