Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 22:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://can-revenue.agency
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://can-revenue.agency
Resource
win10v2004-20231215-en
General
-
Target
http://can-revenue.agency
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133497454790909902" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 2256 chrome.exe 2256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2568 4480 chrome.exe 85 PID 4480 wrote to memory of 2568 4480 chrome.exe 85 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 1364 4480 chrome.exe 89 PID 4480 wrote to memory of 2852 4480 chrome.exe 88 PID 4480 wrote to memory of 2852 4480 chrome.exe 88 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90 PID 4480 wrote to memory of 1404 4480 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://can-revenue.agency1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bc519758,0x7ff9bc519768,0x7ff9bc5197782⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:22⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2804 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1704 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3848 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1588 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4248 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=820 --field-trial-handle=1956,i,16117156717072812616,7631981134216463863,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4a5849ca-aa60-4523-a0ab-92e7f189fb1f.tmp
Filesize6KB
MD5e85496b390e1faef3ceac06fd15dc641
SHA1338a1f6fff707cf3c8b1428f989bdbe6e163f89a
SHA2564f00a91a19910344332d4d0f358633e5da7e04685e79c08e0e3a3aeb4482668b
SHA5129a1f3be1dcf2dab0e0c6261c7202bb00bbef160ad95db7cef9705b44eeaf390e06bd7f40c95922ae7ad6d2f5d102bb4a9a5e01d44e65d27097a7db2089e58fb6
-
Filesize
823B
MD56c476f93831941ab76761cc432c6fbf3
SHA15de9326bbb89391b217d5f9182a4ec47cb69bc68
SHA2560d492b25d94c2947a3e63783730bea44a00560b5a9348783d0bd8f46f878e38e
SHA512e3f88cafd2957995db73e4d5753d625ed80e74aab94811ef745552b4b1858fd4e2d3703a4e5ddaee84380b438105f86471e20d056a8e204aadfe990512c215c7
-
Filesize
6KB
MD5cf2dc7a66678b63aaf7bd73c3dbd4375
SHA11e658b4cebc15131d98dedb9f2285cd29cfaff58
SHA256f2e974ed772e9317cd3e8774d9b924471a356d070049a4b1f32af697f9b4cddd
SHA51251980095713e12b2d031960cfa8d6c62fec1df609c4180e0c11e131879db00130e6f6efc4fc81ab8fff648bfafb29a4231d32e3e640811e277c141df1aab29f9
-
Filesize
114KB
MD56ef5533d64030349ccffdb7001f6baa0
SHA1716795db8f5a1e42eecde839ead3cc21711f1330
SHA256b2f3c2318b60e00aede43ea9bf201da0e7622b7b105df0f0162cc971a6d0e66e
SHA5120b1eae29a75f4411c06a3fec5d978b85ae699e46755b2fb1167b31239ef5e6a85d048e2a6aed0ef675b4f511a88c72b352c2fa9bdade7a4c94af6da02d893f8f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd