Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 13:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://personal-cuentas.com/
Resource
win10v2004-20231025-en
General
-
Target
http://personal-cuentas.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437523124492263" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2436 2696 chrome.exe 34 PID 2696 wrote to memory of 2436 2696 chrome.exe 34 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 3000 2696 chrome.exe 88 PID 2696 wrote to memory of 4992 2696 chrome.exe 89 PID 2696 wrote to memory of 4992 2696 chrome.exe 89 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90 PID 2696 wrote to memory of 5068 2696 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://personal-cuentas.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8650b9758,0x7ff8650b9768,0x7ff8650b97782⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:22⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4032 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3444 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4092 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2212 --field-trial-handle=1852,i,11374000222047262285,6186028150042872942,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c40dd3d63f37a855aabb288bc475ad00
SHA1df74aa97b152e119a9af7dfea59b54eba3fad9c9
SHA256fe288a56f206f3ee488c7dde5b6c0cf528dcd0598a68b51ae9f5805fe1ec07e4
SHA512f1075e1688c087c34da517f9b151925033f760f12969b8dfd943ee255125a90525c2ce8df552ce727da18f42db18f58c7e24be8b51475ae5b37ed8169ad5a470
-
Filesize
6KB
MD5c35864f3c794f67854d332b8d36b03d5
SHA1192c263a6b0c3b106ca627416910cf428b9b9145
SHA256998ec905b1d7a2c96c76ee42dc24fca0aaa74cf15e3f1c5a39a4c11253493243
SHA512197831c1d6dd8843495df3687f8a170d16bd096281400d90082c4727855de487118738c0f089c8ac32f42122339f39c9f823b975bf2e0b067fdd41b1698e8998
-
Filesize
215KB
MD5fa888dbca94100fa221672fd6bf1f7aa
SHA1a42cc26657c909568274e778e2bcc3954e02d304
SHA2564adfde7eb769f8030594fe04521b1579523bd0a5f17524f5a28aa32c7ed4f6b5
SHA512b8bb4dcd626f1b07a5cb7b279de05c6dd71a10b82381ec653f5da8786507e85008094cc95400c2bcfe17de9fc1af82aaa792b12a258b2647af59f22f92f05b4e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd