Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 04:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cenherfat.one/
Resource
win10v2004-20231023-en
General
-
Target
https://cenherfat.one/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437174369633163" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 4064 chrome.exe 4064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe Token: SeShutdownPrivilege 2264 chrome.exe Token: SeCreatePagefilePrivilege 2264 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2736 2264 chrome.exe 61 PID 2264 wrote to memory of 2736 2264 chrome.exe 61 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 4308 2264 chrome.exe 90 PID 2264 wrote to memory of 2728 2264 chrome.exe 92 PID 2264 wrote to memory of 2728 2264 chrome.exe 92 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91 PID 2264 wrote to memory of 4224 2264 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cenherfat.one/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef5719758,0x7ffef5719768,0x7ffef57197782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:22⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 --field-trial-handle=1880,i,6460265383028170215,12565054418989179917,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD558259a5903d6364928c89e1aebbcbdb5
SHA1f3dc463ba7498b908a29d84e46ad11c2a7b0682b
SHA256c0bfb25c728861ac6694a99c3a31c8a6f38d634a4b83357731a1985fcf9be714
SHA512cac0ff0c80e523f461122a7e5fbfbce25ba80e8546a0e1c718aeedb41598db5642b82ee0742d74d7105da49cbbc9cb9407ada162415064dadf7e931eebb2b625
-
Filesize
1KB
MD57d71eaec27aaa06a3256faa75163fdb1
SHA1934f46284eef3316e1ba06283cfc03c7ad1ac72c
SHA25647315cc5f9626799383b8eba83f29d61643903d303d5db9e5272da3e702f5b13
SHA512f4fc6a12bc85e866b7962008eb08a747dbd6c3f3e34a413c06661d9769723a8a0a24808d04aeee400feaaf82fe5b22886d909d93446f0177df529e5bd4ce336e
-
Filesize
2KB
MD5b9e2d60cda2211d7cb311d6ca8976ce9
SHA154aabb8a27fe00651fde1810f5bd5ba318796f4f
SHA256713f293ae7e60d71048ea28ff76944353fcd9adf75284658be608b9a92fb07ba
SHA5121f6148613f93158ac90a94f847e3a5646a2cc692d8e6ef1d0a2e3e7599ce2f5af2007ed14d49c7ad4d6253abcf77f20b54f6b2c46a0d0d65ad874bbf0f99a6ec
-
Filesize
539B
MD56b4f064f3de00edc9e3d835bef196257
SHA19358feaaf0b32ded2eefc70624f5187453903d6c
SHA25609926060d1a6693472b3cc9ea8595bacdb300cf4998df63ac001ad961b4c12b9
SHA5128d42ecbcfd8adde6909cf39ce8943de40b1e0ec0050e5888b547088c2c09f465284d0ce2421211575cf2d10122258c24d83185114da72d624a964c084494728b
-
Filesize
6KB
MD510f33ed2d9973dbdded5551cdfbdd7e3
SHA1f5638fa16a3d660e136feefdf1be875430f14bf2
SHA25646c23aeaaa0e54e8faa7983988ad2fe12b5486f67ddb75d4873db5cf68983338
SHA512c9c64a8f8f5515fe755ab03fc6d25679d7e8c20228d845bbfa6f96bcc7d996119bc5cebd8eac902d4715e779aadcc6d54f2ff9a4ba829ae12dd06d8f0691f36b
-
Filesize
109KB
MD5ea2410eb9e8ccaaa48169e9f2ad2195c
SHA11c60690bcae99c3e1bea09e87a4552fd062f6451
SHA25645b37b9e8b970de36810c2c2229e696df394c309f3c027994901a8dae014d270
SHA5125aec1f954f379d16be3367e8105e63be8132605d025dbbfcb1428d5586f281b637f8a6a1e35a4d31837607652d8eae9578ea4541c4755a04c769a0c6e4cb0e44
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd