Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 01:26
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://egrnet.com.br/cgi/rand_string_lowercase6pcrand_string_lowercase6/Ym9yYXQubnlAc2JpbGhiYW5rLmNvbS5raA==
Resource
win10v2004-20231023-en
General
-
Target
https://egrnet.com.br/cgi/rand_string_lowercase6pcrand_string_lowercase6/Ym9yYXQubnlAc2JpbGhiYW5rLmNvbS5raA==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450036219779573" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1700 4372 chrome.exe 61 PID 4372 wrote to memory of 1700 4372 chrome.exe 61 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 1040 4372 chrome.exe 86 PID 4372 wrote to memory of 3028 4372 chrome.exe 87 PID 4372 wrote to memory of 3028 4372 chrome.exe 87 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88 PID 4372 wrote to memory of 1108 4372 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://egrnet.com.br/cgi/rand_string_lowercase6pcrand_string_lowercase6/Ym9yYXQubnlAc2JpbGhiYW5rLmNvbS5raA==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce7e79758,0x7ffce7e79768,0x7ffce7e797782⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:22⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4812 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4976 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5040 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3856 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5396 --field-trial-handle=1888,i,12258653209856474070,16739519115170099152,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c9a678997f7cff95b4d533c682228fe0
SHA1fb6b2a04ecad40c1e68597164c887ac07c4cb328
SHA256774dde5c879160f9bc626ecf809a65f09582ce00a0d64745cfeb9e9ca74f51e8
SHA5122e2c283a5fe44195e670191d8daa3279f415099bc86bb72e6c2e8e7f80c3c603b6c776dea6067a4282a5d84f72a06a0fb6065a8a9b4882b1b00a0b1a85a16d7f
-
Filesize
5KB
MD509b86e11304c2b108552c936eac681be
SHA1c3b09d74ef2d556c7347a6c651619c91e692a174
SHA256ddf5aec71c623c1715b5473314c29ab34ffc7b77b2561c5ee86907e7fcee88a5
SHA512b79221f9d27f0a231765f93a4f4c11a8b3b09c245caf014f39666715d4ebc9c33a678fccc19c9319bf448da2031bea8932daf3ddf164c62e779b0db8fad628a5
-
Filesize
109KB
MD5f8c9a0aa85b09f905994062119da9c9b
SHA1c515b4b89af6b76e161e1fc0591343eae6fb4aab
SHA2565ba350f2dcd2e382f72df8d7eaa85425b79c806a3107da5d89ed2eea1b5d1c17
SHA5124787bdad3c5da66de76194b6a57381ef76ccb26461c7ac1d2eee1481f99d2050f9775369a48567e623ee2ce4a36a6ca6362d5866f5c6ce164768c09bd136fae5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd