Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 04:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/FF8yyQbb#FBHAonC1vDY5DCqFim6kbA/folder/dQtl0LKS
Resource
win10v2004-20231020-en
General
-
Target
https://mega.nz/folder/FF8yyQbb#FBHAonC1vDY5DCqFim6kbA/folder/dQtl0LKS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431999311571413" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1372 1252 chrome.exe 65 PID 1252 wrote to memory of 1372 1252 chrome.exe 65 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 2724 1252 chrome.exe 88 PID 1252 wrote to memory of 896 1252 chrome.exe 89 PID 1252 wrote to memory of 896 1252 chrome.exe 89 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90 PID 1252 wrote to memory of 64 1252 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/folder/FF8yyQbb#FBHAonC1vDY5DCqFim6kbA/folder/dQtl0LKS1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff8c7579758,0x7ff8c7579768,0x7ff8c75797782⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:22⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5440 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1856,i,2710806420266430240,5158097250403920468,131072 /prefetch:82⤵PID:3924
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\AnTiBoTs7 HTML Encrypter V1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3428
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x360 0x4241⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5fac68a856a3fe913c584deaef796a9b9
SHA1b5003bb246af8caf1bd151ed46bb1ea8908ae5f8
SHA25676d32b7dee00227d3eec60d58a3e2ba00c8629535b420cefe93e39b73f9e73ed
SHA5123ddb64cd1e63850c3b7a1de5ffb2c4329f1c50e5bf91fed6c37512a8447baf120cc5023edad6c101a7cbbe4d1504a1243aed8d69c5bbde172aa8c6f0d53d042d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
534B
MD562f89e6240a75fd0a36ebd41ca7fef26
SHA1b93d9e3a84023ad090c5fc459426340b38678e9e
SHA2565692f78b0b0a66d603453f6d620cdfb1ecf36c8638561e10e25151b93af040aa
SHA512628c43f1bc0c55ee3c33decc6c1fcb54ab7948e7dd637ad3df0a51b98955d16e2816c32a06b3a8f97f8f8823c2e3f930ab6a4008881b6ec6d4781eb74e498396
-
Filesize
6KB
MD5c30ccaaaff97ceb1a8f33ebea65fc161
SHA13a2db24897c9d96db40de16ae5687d7d5a2a3f9d
SHA256587bca07ad8bf49a0b3ce3b35c89c01a53acb2cfea6a3b80e94339015eb141fe
SHA51209dc6daa9e188acfee45ba53621ca85fe971a5f209e078bdaff610ca60f91e8bedb30a060f03350adc64c441f76648e72fb901df15923cdc0909f8d0636f6478
-
Filesize
6KB
MD5092b6ab7d9be2be99d9bd113d10e0927
SHA1a51310daec23d45d58de0dfe94c980f79068e5b8
SHA256ecbd119e5c515b68da6026ce95cafc03300c84805a8c42b2516f83f73ec26b19
SHA51233fd41b4bd42ef3b1bc2182a0b993862039f70889a4414f4a3203f8d3afd5ef31da325c8fc40f1676e4faa04fcc150c2542adc411003d285c27f65050fddb38b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD50afaa0f13432ac961cdcc245b144d93c
SHA18419863ec8f69a7738b51dbf8b845c6ae4deb415
SHA2562f29c223cdce9cc79db796b2b8b81208132be2dd5b7898c08c8047171c734e8f
SHA512f0e4cf4975d4c6e32421594c616595493a9218c01fb311c6d66dccf55684bc8d15cc27a4e6a40fefb848a7d56f5336581d98e11041b09c82a2308b7bc093fcbd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e157.TMP
Filesize48B
MD5d537223554561fbdbd85b00663a3e580
SHA1e35b4e4647aea25add3bcdd759c23e2a7d1e221f
SHA2568111f559ddbf113a51f6479c4c212a5a796d17d4301af757cc16594f8c281ef1
SHA512c871a042e3e0b3b15e61eb1d9bfb1e6dd8b47abd16912631485a4c42bacce4945d27ea672c610a198fc3d17626a3dbe3949b91f2a5abddc57a15f6e66239bbf5
-
Filesize
109KB
MD567c9b852be31d61ee6d28a4c715b0496
SHA17f82daa030f369dd7ac0e8e7a0fe145eaf462338
SHA256358dbd3b49afda453e6e6816fb78edbd394bd3c1349c641c8c25530fd4c9751a
SHA512ac7d232cc6d717d3cb887eedfcb05721bdbb68538ab194cce725733229672cfa9ceb05f287c366e643f87c69bea16848269a27df9e1b72a9cfde69f71e99d493
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
6KB
MD536c2e605ab495538b761ffffb318294e
SHA12803d498a0b5d43eaf56ea52b8da78e04e567f67
SHA2566533bc6a7646ab654522c9724111910525f9d00ee15e1d4c2413b5a9b08f915a
SHA512491a84bdd9efe3119450d705d8175429d5eedd9f722475004000531bfa108909aa04e803ec3459653a9db36da466a0076c2e602c244de8893f823e48008218fb
-
Filesize
6KB
MD536c2e605ab495538b761ffffb318294e
SHA12803d498a0b5d43eaf56ea52b8da78e04e567f67
SHA2566533bc6a7646ab654522c9724111910525f9d00ee15e1d4c2413b5a9b08f915a
SHA512491a84bdd9efe3119450d705d8175429d5eedd9f722475004000531bfa108909aa04e803ec3459653a9db36da466a0076c2e602c244de8893f823e48008218fb