Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/01/2024, 16:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://consulcamp.com.br
Resource
win11-20231215-en
General
-
Target
http://consulcamp.com.br
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133510195967994567" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3836 wrote to memory of 4480 3836 chrome.exe 76 PID 3836 wrote to memory of 4480 3836 chrome.exe 76 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3748 3836 chrome.exe 81 PID 3836 wrote to memory of 3820 3836 chrome.exe 80 PID 3836 wrote to memory of 3820 3836 chrome.exe 80 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77 PID 3836 wrote to memory of 2200 3836 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://consulcamp.com.br1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe3e6e9758,0x7ffe3e6e9768,0x7ffe3e6e97782⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3820 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3208 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5252 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 --field-trial-handle=1832,i,9500037056072968817,18433382010708177209,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fce7bb4eaf6002656ebe13c67f444b5f
SHA12aafa6186e30ab63a69095105940b836848f84da
SHA256ed4c16f7ffe83a61162897b42e016f048c982641c67ac0a08247b69e1e292ee0
SHA5121ec4ad1b100147753af27dbcda340ed2583e2e67154cbd55934a3138526102c53db0a2e1984126087c391bc7b309d99a4a5ae0fac7a9e69378b31ae68f01aeca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\4dd18215-b748-4b07-9bd6-1d88edb40315.tmp
Filesize1KB
MD52e874146b8723b9498dfabf19ecc421d
SHA190026efd9ae4ff06b0b3156aa37f1a77c5fc95d1
SHA2560bba2a0e98dc77f2b216cbff49ad620fbbc00f02545eaccce8b77782c44c3f57
SHA512812d65244fa01d862a4020bcdbe7a86371916b93bae4e8aa31668a1949509875d91fa9487c987e798694e07dcf7ee0a091873d098512bc9810fd686fa0589ec7
-
Filesize
2KB
MD5cf53ad110bb96efa80a0efb5fd78c55f
SHA17be8d058b8c2a81bd3894c28b26571cd364a42bf
SHA256dd88463740be6ce54d28f6715b23798947507a791b01759baec1b2722d816430
SHA512dcdedee5e8e94960f9c8a6a065d9e021c7c8a06b06d81212449df1c89031c99e96fcc591bf54a4e3dd0e924cdc1e123570ffde31c2301a3a407ce72f64b1ec4f
-
Filesize
1KB
MD512a8dfc6b593ed656651b47538743d11
SHA1185e6fc6f0ff07ec589236a657434e8275670672
SHA256e5d7423a7fe5b434d08400ab93db275c28e1497a52e8f2937cee099628c04d2f
SHA5125a2033aeafb87807e76c1a22ea181f1788ee314ff4b471869388c4af80a0952fd32cbc2dbbc7912bb33cc06979ceaab2352bc58ee6d51a5bfc5929c7eed8e075
-
Filesize
873B
MD5711ebd2cdd527ed8c5499fb9d9f4848a
SHA16dddb61dac0ccf752d1543f54eb8268a1997bbeb
SHA256ccd9d858ee5f03e7503ca25be909d224bb8baa404445f886434f83e9f9341301
SHA5120b9811ab9dbc350cf4ae8b4bbed2317a2bebb9d4857b389cbcb144e3a6dc9013e5564e542588a976115e0d97c4df0143a711684482aaf0a791354457987df0d4
-
Filesize
6KB
MD5cfd55dd4c774104d178dae4a149fc694
SHA14872e730936ef4db25eb9c0f74770669289391e5
SHA2561e26ee776e056dcf46b8aff363d4e82371083b8d4223d0808a6ff7f81a384eb5
SHA51288d2c6577221cd5c8de9ba913679a624e14c21f6f9d808a76a642947fae643cae50c557f9827519ab18f42adabec1a8017c3de4833b707729c85538d3be6bfde
-
Filesize
114KB
MD5e2224b47e92674081e79a0ce140defee
SHA1ed6248ecd5c7817689521482b4e8215123529a8f
SHA25601e6b0e3eef799f3b97fa748d5f9233cd5dff570f6b0fbbafe3b92c392ea13eb
SHA5124c6a35561d851a23c218c853491cd35b6642aa6a39887cf3e53f4f67259358e4d3fdc61941398c203cc460b462fecdc050ab359321958bd7fe5fc4947d8dd84a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd