Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 13:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6k2ph.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfuMRxHAeXKcb8GDLStKLS7/D-ceh5CsSXIg
Resource
win10v2004-20231127-en
General
-
Target
https://6k2ph.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfuMRxHAeXKcb8GDLStKLS7/D-ceh5CsSXIg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468601073809952" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1368 1720 chrome.exe 62 PID 1720 wrote to memory of 1368 1720 chrome.exe 62 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 5116 1720 chrome.exe 90 PID 1720 wrote to memory of 2176 1720 chrome.exe 94 PID 1720 wrote to memory of 2176 1720 chrome.exe 94 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91 PID 1720 wrote to memory of 4868 1720 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://6k2ph.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfuMRxHAeXKcb8GDLStKLS7/D-ceh5CsSXIg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61b89758,0x7ffb61b89768,0x7ffb61b897782⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:22⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5044 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=6140 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3236 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3924 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=212 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 --field-trial-handle=1792,i,7961921621304649052,4376396394418255467,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5544375157946d4f48826aa1b94613e98
SHA1988d472ec162c177fce314b4a86d8feb0db78117
SHA256117fff7fad7360728b23e508c86292a7253a08054edffea24d1f6c9b7b5a1711
SHA512b95a05250f8f1ce682a65b165351536629fb4aeca479388338191d512e457ca6b561a15e3a7a7626f96e0f5e6d3bebf4e73bc56e9c071ed6e8cc1511728fd1b3
-
Filesize
6KB
MD57992807bff202c25a9314bbcd1ec31e1
SHA175a27b8e42ad6a4ce06bdf95d868f66b80789aa1
SHA256a2823a98b9b35a39a38d2501fe461c3763f9d800b93c0f473ff82392e0aefd81
SHA51258126ce648d1f5fa3742b91cf8cdd31fb78a058c14250c8dc96501bbb113fa6b215f516c931a84c036f4ad74a2ab15d1e27c06d39c0ee5990068d3f147ce3445
-
Filesize
6KB
MD5e3e7115802274e848c1a0f0374555c47
SHA1e80627023bfa575d81f9c3af9a46060e76e84c98
SHA2562f794d8c339edbe29cf3318401ea405926ae4c7bb3877607478cea718b0ad69b
SHA512cf5609fe8de0a968b0c0b29dd1133e42cc370b933654792d20a5136ce6e5d6d177cb9b0cbf3b1beab4dc9cd8a97752151d4814497cc155161668805668289494
-
Filesize
115KB
MD5665da7d67077c45bab0b52316028ef77
SHA11f0df0fb0b44f47722d0c97fcf5ec1a59e1b44c6
SHA256d523ac1ba6ae5dcc7f5982e765f66bbec30f0accfc7fc164f65c0a2939cb7cc2
SHA5125c835a7d6e7f3b09a729a09e163c8a6581e3c07745c2fef9948aaf9e35d845046aee7c0de287c6e729998cd9236079f03b1e72332e9b984fac3ca4f6b70bf7df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd