Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2024, 05:17
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cashfloss.cloud/[email protected]
Resource
win10-20231220-en
General
-
Target
https://cashfloss.cloud/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522750688708019" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3540 4104 chrome.exe 73 PID 4104 wrote to memory of 3540 4104 chrome.exe 73 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4772 4104 chrome.exe 76 PID 4104 wrote to memory of 4652 4104 chrome.exe 75 PID 4104 wrote to memory of 4652 4104 chrome.exe 75 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77 PID 4104 wrote to memory of 5108 4104 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cashfloss.cloud/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb10b49758,0x7ffb10b49768,0x7ffb10b497782⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1440 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2828 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2820 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4312 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3112 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3028 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3572 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4364 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5460 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5644 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 --field-trial-handle=1836,i,15351674004776127072,3465333718072274532,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5354ba2392a3b52c6d45dd880a25331ed
SHA167794d143b7da43e0c967535ed74867d0674f5e9
SHA2563df217eef2ceae9319f898b084f5a2a9e2c79e9e8358e85168086c1a37b671f4
SHA5124796b4fcc1374721f1e80414f5124739a81977bd0367e2bca2f2562d80baf9be0faeaa4e5ec907c311270ad969415b57bd41d01356838f4b3893730e33b04123
-
Filesize
538B
MD58340d24010a55f76af13d48551bbc1f5
SHA1bb06514c6dfec3c0005d12fa8e596664ce9295ef
SHA2562ff520a78aa1e078f91fa58b47f75a0d22cfad9d11accaf7830c0ef71d1bcec9
SHA5129a8bf3b6d2c12704e6d20c06af7248a9ffe3f5fac5493baf10130803682109ec0998be7dc20dfaeb47219d543abdc83cf829db808300cf25013df17324c42764
-
Filesize
7KB
MD511704533f7b8721d23849b2f2a14d457
SHA1736e2ed33d2cb70bcc48fe26385bc2eea0f919f0
SHA2562bb7e90450113cb984ed5d91ea52017cdfe0422a3bd01ab7bc820eacd1661750
SHA51286d4502dd74bf031208045b061d975af09c658c433df2e038496b68b6e1a60e0b786f002a96d1ced1747bc7dd3ed922d2b0f094964159fcd38eea642770d88b4
-
Filesize
6KB
MD5008028da05c501f0e76df12fe234333a
SHA1e980205bf23a439799418905828c0f719fb35ea2
SHA25654fb1bf1f716d9b1fd9d65fa20efb43275d9804ae8357168daf820054cf88d32
SHA5121d2ce624d4de982fcb73c10cdd3df41e5b0944e89c15e5d1cb2c1614a15812630612a4e961705d89d551ccafa128419c61e4d8e3802f71a9651d548a35fa3301
-
Filesize
114KB
MD5f0d36eb5518031492ba267896f2b5b20
SHA154568d390473233cc302ced26e93cc9486f24688
SHA2561c668c38fc738c197fcc914fd870f85c2ec6a14fa0c0c470051eb8c30669f0ef
SHA5120e6cc978fa4c1d5c61d2db24ce71f6b9d292e99c49cad3854694360e1843d36c637248d7bd3ecb15d78000a3b0b9dddeea16c0042a6aa24d5d0a2e04eea0ab87
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd