Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 15:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://indinasvisa-gov.org
Resource
win10v2004-20231020-en
General
-
Target
http://indinasvisa-gov.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449670701137451" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 972 chrome.exe 972 chrome.exe 1808 chrome.exe 1808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 972 chrome.exe 972 chrome.exe 972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe Token: SeShutdownPrivilege 972 chrome.exe Token: SeCreatePagefilePrivilege 972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe 972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 3532 972 chrome.exe 66 PID 972 wrote to memory of 3532 972 chrome.exe 66 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3964 972 chrome.exe 86 PID 972 wrote to memory of 3644 972 chrome.exe 87 PID 972 wrote to memory of 3644 972 chrome.exe 87 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88 PID 972 wrote to memory of 3784 972 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://indinasvisa-gov.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce8a69758,0x7ffce8a69768,0x7ffce8a697782⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:22⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:12⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4624 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 --field-trial-handle=1812,i,12405630581806971376,4861462207241039964,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD53af086e9c1935faff4b3aee61b48bf0b
SHA13775b7213e915dcf048f34dced0ca8de38d6057e
SHA256b22da0e8c082edadce8e820fc5d368b8b08d9b46aab1706956b18887eb3f72f7
SHA512eb367a653fd4b679f1f8441e4ba5a0ad192c8d91b0e38738623ec8b2e5106c9a6374fa74fc1f6c9353e0f79dc64f970e48da93081ce5ba372a78aac9bd4b8dee
-
Filesize
1KB
MD528b7c3d2efab61a7577852b0c0db163d
SHA1556822c7d818493c7722d2f50a3884d7c44e8fba
SHA2569ca4d8dce81f5fe20eee047742038969b41ff9d7006632b789a97439ba793eae
SHA5121469d90b38e0b9993bc7ce0f60ef8b67d6e1e5bd762b5846e4d74592d549725e965f99c1b7d0c3ed8e2065c9532d5cc37be0a2a03b154910adf7c5e2e6dc0b46
-
Filesize
1KB
MD5933549ea32a66a65f7f92d344e12815b
SHA1daadd7244b024dcb3abd1c643f88a5f6d5ffe558
SHA2568531186e512eb5284aa0a9ab1e979d33e6ac80791d50563045299d5bda52b2de
SHA512e728c3c9e8567e4e42f96a077c9203c4334f3f9ea3d337b2ab6d20069de1d6e4ca3699266062cfde5550cef7132adc9a3424fdc69eaf4db452d71aa44bed99e0
-
Filesize
6KB
MD52e907b2082d8b8a4c8ab366ac25d25b4
SHA164d23f98d52794c97cfe9cc99f5e11c2558bd627
SHA25605f2d814ea00122c581f07eb66819f6657078926631cd2d9c13a2c1cfa49ee5c
SHA512dd164f7167ded708bd5c32c55f08005c9ea8e142a95d5b9584658eac0e68a924488a7ef44a31cb1ba0acaf3f4fb6cd2ea65e5b43185d14bca2dc1ff0c571dab8
-
Filesize
109KB
MD5a0ee07ebbc0d022b79e206591a5ffddb
SHA1d56fa120b008c39cb31ad28fb34634f43125948c
SHA256abc0cdeb778a285826d13c22ed09e4a3c374de4a8e5172526058c4d367399648
SHA51201d237e371563242e2555b7d77ff6720601e968f8084121acb932531750eecb5560e4ae3beb207e110bb101e40622bd7563c37ddd625403db5689ae07e537503
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd