Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
210s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 11:26
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://florerialasfrecias.com:443/vendor/css/[email protected]&file=1
Resource
win10v2004-20231023-en
General
-
Target
https://florerialasfrecias.com:443/vendor/css/[email protected]&file=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133452987932797780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4092 3168 chrome.exe 83 PID 3168 wrote to memory of 4092 3168 chrome.exe 83 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 1644 3168 chrome.exe 85 PID 3168 wrote to memory of 4100 3168 chrome.exe 86 PID 3168 wrote to memory of 4100 3168 chrome.exe 86 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87 PID 3168 wrote to memory of 4840 3168 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://florerialasfrecias.com:443/vendor/css/[email protected]&file=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc89819758,0x7ffc89819768,0x7ffc898197782⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4908 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3756 --field-trial-handle=1800,i,7065821898176536382,9979004154425121327,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5a78b84e19ad26a2c147647c099262f89
SHA10024dcae3ef2df52518ddc2febf2eaf9c7964697
SHA2560fb7d3e121fdee94945f8373799c4cc7b01be33753de1f8eeae0b4804c813e9f
SHA51210d77eb6862abd482c402c14eec3831bcf1afbb74695df855acb365cf186858ca9375fa8a7dada94d4c970190ba249d9f348854e23f90de06cb386422d83c7a0
-
Filesize
872B
MD55f8288ec3fa39122a42deff88f56091f
SHA1f11dcf23ea158417a12256f6a723371ed93c0bd4
SHA256731dcaaaba93337dea32e7299dbce4feb54188d2862bb71c4121b1df4b8c610b
SHA512d79e3f9332ae17f609d66fa0cf9d2bbea6b0c85cd077f72a9876870ddd10be0e42ca01c511664512cc0a2ebedf72398685f00ab4ea23a0c74a9dc7248da851d7
-
Filesize
872B
MD5debbee60088a927ec9577df9fb8660fb
SHA1e2ebfdd5e7916b6463ea9ab31bf87e638edfed9e
SHA256c2a6485c0646e81184b04a465dde7d561d78caabb4a9127660dab2a953d39e3a
SHA51287c0eb9db8a3adc866cff2140a04f6bf0d81d046037b6df38926e5a1c9a1e24d8f7652171c8811b7a5ba93b54c56679c2b6dc9eb3a6ed5ace5c488b23f17a278
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ce35dbf9-0f78-4491-9e5e-6c1a14d2d0e3.tmp
Filesize1KB
MD5c6b8c7e52d54d1432a11148cb80b95c4
SHA1dc02b949dbe99be0456f500285ecb3b6db2537b8
SHA25628bd2f83f1b95f4be0da5a1929c4fd5b1ae16cf7f3d3d4449687c1864b0b62dc
SHA5124a27f2b48a1b9dcd0a44d7916c8f9204e7652ec0e2f8a0d82bdffb16635f5bd6e724f741c313a37da0bd124c35dbf1868f18bddfe9fee8868048d9d8458962d9
-
Filesize
6KB
MD55a694b8e8674075a90d0b0cb6f879edc
SHA1877a9a64a2d840a8597813a17eccb1ee0df4f650
SHA2566f6fc7695855a20928fdd28588d9d78a959fdead022bb0067458ebb2f4e8ec6e
SHA512242d2c1124658e1001bf0bc6b78c0ad97a1258c35a28cbb791de9b16f01d49db2a0518519973e76f1c064b44120a8c0ec67ae25b6a273fcba20757ac117fabcb
-
Filesize
6KB
MD5b7ec0d8ffc8f48428b8adc17f25609c1
SHA1d7e9a028166e343a61ab45b14312aaa583fb781c
SHA256a676041d8f309297461cdecb321a641760579a1f3f7df5e492a5e6815616a546
SHA5124f6cecf03283c8597e1449b8783b8fbe5a49cb940d573fbd5e90c398d73cc3a29044e4d713074ef1d83b10ea898469dba803767fabe230081f243bbbb068f136
-
Filesize
109KB
MD5a987395839b94a5fa2f4cbdad568abf3
SHA1c7dc89fbe392fa7cc1a5a5af7c89cdc7b5b33c3b
SHA256d322f545d499f4f3799de8efec0ef691c4100ed63e691028554d9bf361ae5615
SHA5120ec6c3dbd184b592e799c9a587ad0a8890673b89393a5ce3fae82e81c9a2e8e15fd9322c611fa587d4e3af7cb94c47ed49763b3629abf1b27a1906683d69472f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd