Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1802s -
max time network
1699s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-es -
resource tags
arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
30/10/2023, 16:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D
Resource
win10v2004-20231023-es
General
-
Target
https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431571377899965" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 3112 chrome.exe 3112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2732 4544 chrome.exe 83 PID 4544 wrote to memory of 2732 4544 chrome.exe 83 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3868 4544 chrome.exe 85 PID 4544 wrote to memory of 3980 4544 chrome.exe 86 PID 4544 wrote to memory of 3980 4544 chrome.exe 86 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87 PID 4544 wrote to memory of 2680 4544 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bpoinnovations5.file.force.com/servlet/servlet.EmailAttachmentDownload?q=yse3pzTxDhdfKVRT8Zk%2F1rLkHrEZ0h%2BnF47%2Bi0V8l8MtpCemkrYOe3NHfVjo6pRB2IjLOuIz%2Fk%2F1NIPy8EJUKg%3D%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae43e9758,0x7ffae43e9768,0x7ffae43e97782⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:22⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4752 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3600 --field-trial-handle=1872,i,7204156268830014693,10662200674080096084,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57197477497534fe737dc90625ae8f61d
SHA180c2760b6448ca86d75ba6385deccd9ac16e4d22
SHA256a76d2c130a9274efd6ef6c07a41291622775453f64a79e0c85abdc90de76755c
SHA5127a93bda73518b1068d9bd4475b84adfb9abc18e8b5088f77137da563a2d030213695edc244351f46ef15fc96ec38e8da00d7a455a33bffafe49f1f1577f6d550
-
Filesize
1KB
MD56fecc7ae3badb83de30429311930bece
SHA15644812a1b4a2f9d9cb462273a265f4ea5fa1c7b
SHA256e8eb0028a8f383975561df4631e5b3ded67840e722037291ab19c4036e16a375
SHA51298289a45d692ade235ad745900e54da30de0e91a62d14f170f95578a6dd9b503c59b803fe3d30bcf066afc421144e71ef316073df4f58b29d221efc8c7637153
-
Filesize
538B
MD554453e3107a1d4bec31a645a0658b889
SHA164f05e65fc4bcada1e13f6e6aaa394676080eebb
SHA2560c07795f668e6e04da7e807225344324f2bf4781c1fd4a1c07636fcedb59fc80
SHA51206ead021afb7e3af07dd64561ec087deba01f6e01a055cc294fb5616b604db7e4125b5a1a3a3d485a16b240d66e2b83b3aecc9f9165ea258513fecd36e3e9108
-
Filesize
6KB
MD572ae3c8e09bc69436265b472ab9fef5a
SHA1906adc916882949cc763c9b3a7e227895ef7a119
SHA2567faa006ed7ac705a80ac6c37455938dbffedb49743449ac9a3a28febd287982c
SHA512901b3e19c15f16a43ad46d5a5238914a74656cd54bc492fbf5664cfb2bfcb6684aafcfbc91b4c9d778e7789e1392b4ae43e97f661d2fe4c7ce23fe9e9892f496
-
Filesize
5KB
MD5f060e05f157176783bfd2d9fea6a2620
SHA18d1656239a929cc5e1d7cefdb66d8bd59307fa82
SHA2566ce9c2b2bb28b7c4a17f2d8d4fa96b1386f293d7ed32490821d80ea588ee6458
SHA512c02b223dab05d8923f6b51355472fc28738149b2b390cdd8b165c610f67e23f0df9c586aabba1110cdc7a1a35c1b4e2b57e2a2328bb799546f9b1b5613cbf15c
-
Filesize
5KB
MD5f682d6bb05c01fe9ce25c730dcc9841b
SHA1d4f0b7d35835c3f8596df49a33a2c03308a8f521
SHA2560f17abc92ee39b4ec14dbba7d987164866a6d4249c7d08b1cb1a9fbdec8074c0
SHA5124aa8ce53cdc7b9852624f980e018aee99e0bf57beffdfbc151b7563e60cdfe6786f9d4bdbdd9ac25a3768cb1cf2c6f60a038172bcf9f6eff28c7fbae76d103ea
-
Filesize
109KB
MD5b01329bfaae7964b7460bcd2a63f3d2f
SHA1640ecfd272128e3469436b93bd783c7e4cecd0f0
SHA2567821132b696e7606a2f75bd42869e25cead334f65ba0380ec61c35e977ff0f71
SHA512ddb8de039e75a41a377c9013542f17187c9aaf14dd2d0db7a351444f85949ed99fe44b2adb942d36ffd8f8c6d678709c44eee78cc6a85548f55a198afc3552a2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd