Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
417s -
max time network
424s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 07:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.atre5v.blogspot.com/
Resource
win10v2004-20231023-en
General
-
Target
http://www.atre5v.blogspot.com/
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434697961689251" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeCreatePagefilePrivilege 2728 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2924 2728 chrome.exe 87 PID 2728 wrote to memory of 2924 2728 chrome.exe 87 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 4940 2728 chrome.exe 89 PID 2728 wrote to memory of 1708 2728 chrome.exe 90 PID 2728 wrote to memory of 1708 2728 chrome.exe 90 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91 PID 2728 wrote to memory of 3472 2728 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.atre5v.blogspot.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb3339758,0x7fffb3339768,0x7fffb33397782⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:22⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4740 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4732 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3084 --field-trial-handle=1884,i,6085905056538245977,13887401378508536190,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5f23ad2287624b1c6c31f1f99f864ce9a
SHA152a0e7dd31d2502934d88e214169f7b579d3d603
SHA2569f35ea947de34fbeca5e4b63a4e9125db589eb7a763bbcdb5b478fa913a4ed3e
SHA512b5d055876e2e3addea2de0f2ba19178525df945786fa66bdd9029dea589b85eed1c641d18fbea63cc3f0861460ef60efa0868f86396cc5d5ac4be9f4e9e31532
-
Filesize
3KB
MD5e8078e6c77dfeb680ffc26b425457a5c
SHA19a01ac014f3968bf3b8fd302e5ebd56d7a4f9ec7
SHA25690c62a7846b6a8b1d958e912b96e2a2047ef97f4b92b914a9a64d79857f199f6
SHA5126bcf904da81c0eb133a2c21a123a05ae93bcd2219b583b77ea20e72540ee27571415bb4feeaebb4261b0656178e82cf00378d51f978ab2310efa5783ab802277
-
Filesize
539B
MD5735af034293759e6baffc90201c4f38a
SHA109a38633771a56c3224b501bdd0b463637d17133
SHA2566974cdd7286a0f7105b8173a68939ef5df9e8a6f62e702d650d5589fb3d11c8d
SHA512706bb6f141f5b4a5f51188829aa83b08119672a24698619a5ac203908c92cfadcd9fbe4eb2b630d5a1aec501395cd80d29c3907a7e921502a88b5c0a1302f1fc
-
Filesize
6KB
MD525707d8362c23311de56f2dcfc53e895
SHA1ecbc6646d9096485ffa79f2566efffb8eeb6d5ba
SHA25645687e2055da19cf9eb789091eed09839e4298f2e9c4c7bd2c45d0aef65c3703
SHA51262c7626f4f3de51f149d38bc31ee6e7e52265d36d47ea70db7fd04ec8dbf3609984782d0c7c84c03f0d23d4798cec070115104a1ee8e5ddee2ed047c9b5a13b2
-
Filesize
6KB
MD519d34aa2ea71b698c477a06759a8290d
SHA11e8887a5c93fb4f811e9c556f9a320807e8655e6
SHA25639af47273e08f04eb4af8d2af7ab252102a81df616cc0b10c417b42693c355aa
SHA512991c0f9d7d770bb00efe84a4d948934ff401d864600a77526fdb9b33860c0d9d409b70c3029aba5f846c20e26d4a5dd64a563e03fa00f29d735742677a8240f9
-
Filesize
109KB
MD588867abffe2ae7c531f63051c732561e
SHA1fb36e7994dd4dd3c6560454dc252e8a6df9eccab
SHA256cc27a5e7f38de7190495d73c2601e499aa2ace77ceb0189beea622642ad07913
SHA512461fb6c42d28aaa7ab4623a84655d7839a2511a28794ed717c5e1488c7dd83e51c9e88123d3f3c882486cfe498f3cc5a97f67df7eea5c259b9133b3f8592023f
-
Filesize
109KB
MD5652678c8eeb5a56edd907221fb05bf59
SHA12be3d5817ccaf391df8105be45bdb0732baec6d5
SHA2563b4e99335f5eb8c97723ba05828792edc9e2138d1009158cf8e27c7d17945038
SHA5121978c4db9ffaf3d6a5d43b3457a0169896fda7910cb87f031a1a1c9e292521d6c4132c9d88b1d36c95dc849924ee97cc473ecbf6f7dc37f529df5d08035272bb
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd