Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://klu.mx/landing/fx/
Resource
win10v2004-20231215-en
General
-
Target
https://klu.mx/landing/fx/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486948488275381" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeCreatePagefilePrivilege 1852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2120 1852 chrome.exe 76 PID 1852 wrote to memory of 2120 1852 chrome.exe 76 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 3352 1852 chrome.exe 96 PID 1852 wrote to memory of 4256 1852 chrome.exe 94 PID 1852 wrote to memory of 4256 1852 chrome.exe 94 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92 PID 1852 wrote to memory of 1676 1852 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://klu.mx/landing/fx/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9a909758,0x7ffa9a909768,0x7ffa9a9097782⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5476 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5640 --field-trial-handle=1912,i,14803135670627212056,11191187690453593914,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
Filesize
168B
MD5491b96132b8aa21d09a76078adab6047
SHA1ac7816c21a90d70d1f7facf4e7219bc642b29fea
SHA25678ed2d3bd1c7d96acba97a080a3c3b5d949a769974006576ad10dd3b40d3be3c
SHA512eedf610fec3b1845d5b38e84b398cd68c3c9f49c18ecd2c268f1520e7e6902ecc6e75952853ab906b646c159240c86568d1f79a8895b8bb8fe1028ca9c73eed9
-
Filesize
6KB
MD5e0e67e42c31052fb9a1f4f1fa6f4aa57
SHA1f6e824c13dce88dec356d337887ea98f696b4a4a
SHA2561f33a8078df3bd3ba8ab1082b5b6d0024996a01e7b0005d910e1358dbadab8bc
SHA5120155500edb43a5f762bb1a14c18017bf0584c327a9656ce9b144d4f5d38013b7beb9a82450e11b0818f6299fcb905812aaa310e69034b99c79fe8966ec8795ba
-
Filesize
115KB
MD5473a16223f3982fdf98a9dc7000c32d7
SHA12d5c7498c6351136d2f982777da98b486f2be291
SHA256f815419c842d0ebcdcaafaa18ed5115d4ef5baf664f87beedf3d8927434cbf04
SHA51294bef07084cac2055b532d69fee8c3a75d8d6bc2762b616a77732f429e7746b686e2057fe43ff226f0cc34b2d45c173dfcca9d457446b21c4ec5372e8ace1dc3
-
Filesize
116KB
MD5c8428dee771c9d4dd44ab732dbf69790
SHA1d9ab9274db74d4f5c849dc1da63eb2f0fff4c4d3
SHA256924f07a6d542064997686a1818ee2e2e8f65bed20f76fb96653fb48acd4f7a9a
SHA5128bdcf4c80ac2bdae4a56d1b69fec36955eb8f84b36ad4dfe090a24beb8615e17de8ad86f14624793baf2192417f677fcb705eb1cd69033c2340922ef71786130
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd