Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
251s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 23:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://imagenes.sanvicentefundacion.com
Resource
win10v2004-20231215-en
General
-
Target
https://imagenes.sanvicentefundacion.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133477622507835487" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4860 4760 chrome.exe 46 PID 4760 wrote to memory of 4860 4760 chrome.exe 46 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 4636 4760 chrome.exe 90 PID 4760 wrote to memory of 3036 4760 chrome.exe 91 PID 4760 wrote to memory of 3036 4760 chrome.exe 91 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92 PID 4760 wrote to memory of 384 4760 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://imagenes.sanvicentefundacion.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc18c59758,0x7ffc18c59768,0x7ffc18c597782⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:22⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=6136 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3296 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1644 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=6060 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4000 --field-trial-handle=1808,i,17995890410216771305,3921895670730279691,131072 /prefetch:12⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52a3cf850d5d780ae310f835aba9bdde4
SHA1e67ee8ffd9fe2af6533f0bd636431f115b6f4340
SHA25640f74fc74c32504481248b355062e4d882130e3d160b5bab902eaa8031842252
SHA512a447df8d2d0246e5f0153c3e66cdc4540c7147eca44d36f2876a49f2ebfc1a9931e40903b584cdff579764a2f5654a3bb35662ce5dd97a98334a89190de4ed64
-
Filesize
6KB
MD5232ef95e4a635124f6e8c3e28c179072
SHA1e6c3a56f52ebe5c4cec6a6f0d4364faa3e8a0a61
SHA2563ba48fb3d6de8e6322744650807c20d2c40ba5d775c9bb28a7a9855e686d5401
SHA512c030b8d1792cf85fbe774aa59d193e5a5ae7dc6556d83d44b8b7e8d04036a910b932465a8598b107a83368b1de8187ee83b5743a2b3058296a998e22757895ef
-
Filesize
66KB
MD5f86dafeca4aa1b6fc01a86a0467a236a
SHA1a756a40f6fb208f7caea5a5644fafdea74658910
SHA2561086a54e621a1874b37f222d81835b131fb89034e65c6dd87960d57ea2572d5d
SHA512347d37f8e7a89deca433dbdbdc3d573b9cc035b13ae975ac4d27c3bfbd8f70a45024407b3ef01a211bc881e05786d165578192dcc7a85aa940106bb3938affab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd