Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 17:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.168.5.4/tenda.sh
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://104.168.5.4/tenda.sh
Resource
win10v2004-20231215-en
General
-
Target
http://104.168.5.4/tenda.sh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133501598492951617" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeCreatePagefilePrivilege 2188 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2408 2188 chrome.exe 87 PID 2188 wrote to memory of 2408 2188 chrome.exe 87 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 3204 2188 chrome.exe 94 PID 2188 wrote to memory of 1252 2188 chrome.exe 93 PID 2188 wrote to memory of 1252 2188 chrome.exe 93 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92 PID 2188 wrote to memory of 1932 2188 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://104.168.5.4/tenda.sh1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8533f9758,0x7ff8533f9768,0x7ff8533f97782⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:22⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1000 --field-trial-handle=1872,i,12075159977839669065,15529864403283560133,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD57059327758234d7ec1ebf39860c5f7fc
SHA1f57828c0ce223f5cd1374a934262656a3d5832ab
SHA2561ca4793870dc5fffc5cb8bd92adad681d5c0692a1f3bd228a2fbd7b8fedefda0
SHA5123f5c3f51976d5f2cac2d92a6303bf051034e3b381b50759cc1bf95e7db235439bb3ab6b4039a26f827867178904f5cca31aa06bd37e7788c066822e9b580997b
-
Filesize
6KB
MD53b67c5593818be95a72dc3eea1a06c3a
SHA178445e8b2bebdc3bdbebe7b3a6ddd94cbfab85b8
SHA256a68d1950994d5308f9a93d9c98b47217fb52c607e8e496fba98ac8a1c1c74d6f
SHA51211b77b179bd72a271e78b471231d2f630c86e5cafacd44b355a3e0f163c128fd9128eaed2f2d60bf87883590bac3a06196e171ae4a9939fcc926870ab50a6f3d
-
Filesize
135KB
MD599a989c0c3f2bd925892c47419ef54f8
SHA166ba790222f3a9555d7a28216cd080e1f8aa18df
SHA2562fa69d45096e0f622224303309589752c1f08eea02361cdbf335b0270b478ff4
SHA51216af510143d9638a95bbf0a8fc41f28f706f89f26c07d12021da4f1f59b5a6ca1e7cdc688711e8b80b5202dfe959a66a0de359f9cd4a215a2193a3d7dfd899d4
-
Filesize
115KB
MD5884a06a550d1309692538e7e855deed1
SHA1435f61e1061c9de46b24cbcadce5d1644b35e735
SHA25671941eef85b5319c10b7f962a1ef52f405bbb7b11a005d91b1c314c3a49cb599
SHA512728371ec4010b7d610bfc125aef462e9bf87d6588790ae7c12834c397ab48b31417e4b3a9ad6ac13f1d3a5429ee6a17988ae1046797e74e638a5a3537a389690
-
Filesize
115KB
MD5aa39b039d943695ca580a5510cd1fb8b
SHA189f90fd8feb9f8d73f8ccf147890b87470ad6686
SHA256fb83898cd51b49a4999ead212da22766058b83b3adac79a3c40f42f778545350
SHA5128dcb53c7645a0831a88315e84de222218a74dcd63b116b579e4c023b04927f25dc3633f6ddd5df01ef6e440bd355972d16ee1f01eb3f4b4649167fc290b239c8
-
Filesize
116KB
MD56f1ecc2472e327c04ee704bd28c13300
SHA1936076c14ffd28dbf098f08ae2f6d4dd1fa606dd
SHA256da696d1f112822e4628a779c2ed5f0f8f3bd4dda34610534046ebf85fa033f3d
SHA512c1ac5098782c77c7f49891982583cc9e0c18877699acc238f7f257a4fad89c76bc9f26fe7ee987bca0bb8e3f57d2ba5d8cdb59bad9299d9bb9cd937c1ff13464
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd