Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 06:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://atogo.info
Resource
win10v2004-20231023-en
General
-
Target
http://atogo.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133432925222561329" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 468 chrome.exe 468 chrome.exe 3204 chrome.exe 3204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 4196 468 chrome.exe 20 PID 468 wrote to memory of 4196 468 chrome.exe 20 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 4040 468 chrome.exe 89 PID 468 wrote to memory of 2268 468 chrome.exe 90 PID 468 wrote to memory of 2268 468 chrome.exe 90 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91 PID 468 wrote to memory of 4764 468 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://atogo.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb97dc9758,0x7ffb97dc9768,0x7ffb97dc97782⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:22⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4952 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5092 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5016 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 --field-trial-handle=1868,i,8500145653844665141,15893808091678719634,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD57ee0c8057cf9cdd5a74c7b5ef2ef8256
SHA197aa41bb5d9ec38b99f5b2f4fc7d4e3f139ff65a
SHA256654602082c1d5eae654be37b08435e7554541726e775c13fe4d3e588d96d2306
SHA512964a0d02efb3c4a87e6b9ad1ca100195560fcd21e5b51c27276dad02d563b6124facb23b1d80570e8ae32908b6210cb302ec0a39933c2c7e54635c5898fdc5cf
-
Filesize
2KB
MD5d005e5e01390c2ee84e561f422644463
SHA1a343ab07e80533f1c783d3b5b7a5a4d0cfc0b23c
SHA256fab6969d1df24bbba6306be7329babebe6a85b20223dfb4466549112e51bd4a7
SHA512cde60d93afc6c543d55ebacb66c14c4359e0fbc02bea00b36a87d8aff741549aee69edb7f092cd4c4b58c5c573aafbc88c25e31c1b0edce0cb9da157c1ac97cc
-
Filesize
539B
MD5a7d7d9b05ed9c5bb191cba786e571fb4
SHA1136462fe3067011ca64f2b645129e7169617c3d0
SHA256e014ccd04a43c45822293c5a5fd27b1f419bc54aa6ddae81ed183627b9aed7a7
SHA512cfb180bc29d172bf1dc68602ba6e78f34a79a178a207df6bee783b947ea748e5dea76f45d0ca933c0487291eb900c29e82f29330d13ddf96790e93aaf6ab10d8
-
Filesize
6KB
MD5aea97bb16060c650e204728b571e0e14
SHA115dab6671b5d9876bcc887fc42dcd09e0c4182c7
SHA2565413ef8b18713c0ebe59ad8cae2ac6e0a4dc1fe0a9ab01a5b8717d8dc83b476b
SHA512a5b9bd92522381d46c1f0ad83bc8a7f1d47455a973f0a20da1e4152aaf216ac03018cdc6d62e4f3c4b4bed30f3d7f2922f3607482b17b8b7d5767a945b073167
-
Filesize
109KB
MD59032bdd8aafafd4124ecb71c79193b63
SHA1964959ad35982fc280202af4343d54d7ea868fae
SHA256de47f43235daa2f99ccd11428cf682eb5a32c293fc3978a9fd152cdef9334312
SHA512d01643593b8a0e668479a322449e9714cf58241a33d05d4f07395866593f9c7134af9d3652a73f62982356d8df97a69ed3c23e23b578810c79c83f70548d7427
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd