Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/01/2024, 20:36
240112-zdjqkaehem 112/01/2024, 19:25
240112-x5akvsegb5 112/01/2024, 17:37
240112-v7njdsdca3 112/01/2024, 17:33
240112-v481xsdbc6 1Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 20:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://constancia-rfc.info
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://constancia-rfc.info
Resource
win10v2004-20231215-en
General
-
Target
http://constancia-rfc.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495657136636079" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3276 4464 chrome.exe 37 PID 4464 wrote to memory of 3276 4464 chrome.exe 37 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 3168 4464 chrome.exe 91 PID 4464 wrote to memory of 1380 4464 chrome.exe 92 PID 4464 wrote to memory of 1380 4464 chrome.exe 92 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93 PID 4464 wrote to memory of 1672 4464 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://constancia-rfc.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe36a99758,0x7ffe36a99768,0x7ffe36a997782⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:82⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 --field-trial-handle=1888,i,4661258101489805067,13528866337772165981,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4768
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4604
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5f104d8dbaf8ec0a3a52a79f1f305d231
SHA190a04a879ef4c2380c1d2150b2c8b9be1dcccc0c
SHA256eec8a225b1d61b0cb0a9e926b59c4c930e36ef94660b841720fbe072de8ec8ff
SHA5129218132f779959c91d8b5e47a8e115dbe37a1338c299cc18e7a6dd9997869786e6032250c7126721e38a9088c393fd710cd1add5f693a9013ce0982cf2da043e
-
Filesize
1KB
MD5b56a932dff80d94d599d1d8c6603b249
SHA1330279ca710554da01e364e3856dccea865b6804
SHA2569ad04aa9f0d621fd45b9683a0099f4ac64663edab63581a7418d3a0d5b5f5b70
SHA512c896fc95d53ff8c5ac9bae2eaea63d97a81f8920017f3f5f8b36375cf484a0b458ec437d0adb01824a4672f6492891a9cea818c12aceff85114b1dd9ede5284b
-
Filesize
6KB
MD51c59a9ca104c2fa0675eb869b4e3d2b9
SHA1f672fa7c962bdce0b28118038c7497113de79458
SHA2560197812533ae089e8addbf330c1de2310197fb666bca3a2d2836f61f13b1aea4
SHA512befbc0eeb31d0417bfee8d68f75853e73491b34d6036c832fe9c03467df0c179f3eb455a5d61b5afee0f188f49d5dd1ba62161b8b833f76e1d6dc1acb594130d
-
Filesize
114KB
MD54474a91f15e7370a002c01a238541031
SHA12b03e1f0cb61ba5cb2508584fe0f49111ecd64c6
SHA25668f8b21c37dee4a005143b107c2b2ca0e1a6e1860d0cf279c49bccf1e3e0978b
SHA51245af09081e8042a18696f4551cdf066aaec5c9bc9f0b3fbce25bb119c240cc3fa972b40ee1c142a1cecab901626617352ba6e8253c2b26d3e66683c4092476a7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd