Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 05:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://atolodgement-mygov.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://atolodgement-mygov.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
http://atolodgement-mygov.com
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral4
Sample
http://atolodgement-mygov.com
Resource
macos-20231201-en
General
-
Target
http://atolodgement-mygov.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500279759041554" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 2568 chrome.exe 2568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeCreatePagefilePrivilege 3044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3436 3044 chrome.exe 86 PID 3044 wrote to memory of 3436 3044 chrome.exe 86 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 820 3044 chrome.exe 89 PID 3044 wrote to memory of 1740 3044 chrome.exe 90 PID 3044 wrote to memory of 1740 3044 chrome.exe 90 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91 PID 3044 wrote to memory of 1844 3044 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://atolodgement-mygov.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff986e09758,0x7ff986e09768,0x7ff986e097782⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:22⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1844 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3828 --field-trial-handle=1876,i,5863732611591136553,15279269321528712065,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD569157a41fe32ce684ba5a3e1d0864868
SHA1f9e4f4888d96dd367b7d7fcf385c5f4223f8aa5b
SHA256703d6c771da0de78850ebe9c9124c0a6fe6061a34bab982cd36fde2092045fc0
SHA5122b612f311521d171e8913d0f4f837f8bfe42cc7619b8a2023bdf2a8efc9b7071f8045003947e660089cb42ad34bda28728f8679f34b396d26eba0e3ddc6fbcdb
-
Filesize
1023B
MD5d429786f5d5a1c9dbe1614a705a34c61
SHA1d03d23189183c74362f1eed6bd5ab7711d6d7107
SHA2569f8f9f9f4020b0ba5a9192d1bccad22cc9cbc3a2c4050bdaac449fa80d8d8c9e
SHA512db2927e31978caf2b45eb2eacc5f1d2d5c60997f7096209acc6e1eeae40ba2d7ad5e4c142d658be8692946eb95d3a194f7ad042f1fab6277be543440b6ab262b
-
Filesize
6KB
MD500459035e7148a5fefbcbe6b109699f5
SHA1ab8e80b124a7413d954ac8c5c32f01831ba8f9f7
SHA256766dfa0bd278ea736e05ecc148512489f2bdc5ba819b7510a64a140bffb60691
SHA5126b4b4d4f854c54871fcf545951b1ff9b9a70cc803106b556062ee63a04754adc20d2dde2bd7aaa7cd21c28f01a0539cce8acfa000b1ceab2e84215fab198a655
-
Filesize
5KB
MD56f4b1e20c83b5b165ea73ac51c93d6ce
SHA119fe0e2676687bcaf05f886705266cf2fa6955ee
SHA2569e8a821c37cefa6d826b53d7c45ec43033fffbb88b665408b88b81b6d39edd66
SHA512541d5440bc2b38d4f1a7b95c26f2ddb9efc9efcdb6e22c6829d26971bbd89672645157e01154652ff98a5e34a357295b535404ad82157cd78747b916b338f41d
-
Filesize
6KB
MD5997fdb2fffd2ddd1e92edbaeae32d7e3
SHA1ec1b309268d2ef70f3683c26905bef11b98e6689
SHA25650361f44b7ada160f784d59d48445dcc373a4f35b442038ebca0d05ea2cc1e34
SHA5125471296bc8cf0d29d5f50f9c749ed18c864044b67e6c210fca753e061ff25e17bbd561035ce0aa19ef2fc85bf899ae1228ea9028b427923f279f36c964710e91
-
Filesize
114KB
MD59140191e3374b071d319023ceeb0551c
SHA1cf432ad973f2f85a4cded511e0d5098fb1c89e9b
SHA256b09cc63fd68430de3b3af0548307967ec0abf80ca28505bf6f4e0294bce6cb5c
SHA5123335c66b601e0c9d540d91b34f2fbd2d5322d2067c46a84df39f0231b22983235b37f752cb482f84035f710885b62e90b382537ac6224b7b1ed8da4b0f9a6442
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd