Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
486s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 15:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bluemediadownload.lat/url-generator-1.php?url=XWWUCOrsJWk+kpqcqmf3WYWuwHsKMOvkzvubMfhbXRmy+1Bh0pLe2Bvw3gBkEf9KYR5KFvwr1yIsKowp898TJjXze7EhU6oJTCnxN2lAWE4=
Resource
win10v2004-20231222-en
General
-
Target
https://bluemediadownload.lat/url-generator-1.php?url=XWWUCOrsJWk+kpqcqmf3WYWuwHsKMOvkzvubMfhbXRmy+1Bh0pLe2Bvw3gBkEf9KYR5KFvwr1yIsKowp898TJjXze7EhU6oJTCnxN2lAWE4=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528309588908665" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1948 chrome.exe 1948 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe Token: SeShutdownPrivilege 1948 chrome.exe Token: SeCreatePagefilePrivilege 1948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4176 1948 chrome.exe 84 PID 1948 wrote to memory of 4176 1948 chrome.exe 84 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 2112 1948 chrome.exe 90 PID 1948 wrote to memory of 4564 1948 chrome.exe 87 PID 1948 wrote to memory of 4564 1948 chrome.exe 87 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86 PID 1948 wrote to memory of 1572 1948 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bluemediadownload.lat/url-generator-1.php?url=XWWUCOrsJWk+kpqcqmf3WYWuwHsKMOvkzvubMfhbXRmy+1Bh0pLe2Bvw3gBkEf9KYR5KFvwr1yIsKowp898TJjXze7EhU6oJTCnxN2lAWE4=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83cf09758,0x7ff83cf09768,0x7ff83cf097782⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:22⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4864 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 --field-trial-handle=1864,i,3103593341043453678,1431047926014836210,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD599970860741b5556337e8f08ae87657e
SHA1f332efe1f634651deb690f006bfb7e7088535408
SHA256334f3d99f655cc0b3c4b0323e33e26f6668ad7ec7d0c05268922687dac015545
SHA51205519b54943db6828a8f0a596c01a8e53658d70ab0eecb9bca80496ded015b8d4507563ba7334d1fb2aa0a5af9b8d56975554e72a07925062da8df93839e3e9b
-
Filesize
3KB
MD5867d9d24e237402b832dab9b854d5f9e
SHA13f7a5ec0ba4c9da99e868887a0c09145f952b2e3
SHA2565621878d285834ca4bf16a0e838ce2a8160d2c705e407f106173f3159f43967b
SHA512aaa76af4d6a8c4eb3aacb27b91b968a1d915051209c060ed10fe2865cd4de95636946ff86dd32d0b473917442fd6e2d2313f7cdf431693fcace084f60b24b916
-
Filesize
1KB
MD5af42bc9528d20023a9c0d200f2b04710
SHA13918959357eb2669b49f7aaa6dc7af7cb49a3dc7
SHA25683e050654d46263d5ce3489648a8a411e0fa06bd7d349fac56d9878d480736f2
SHA51221ad771eb112bec8600ba7a11234a18e2c07be73530168e6a96d37f5556160261d4b1f54623c2682566b03afb848f0934dde0c38d26c21c5b38d958570f68d42
-
Filesize
6KB
MD55bb075678855c3317a1dcebd906646f0
SHA13ff167a26be51e06caecd564082a6cea6d600101
SHA25695c1b3323e51be488880bc9e77d82e32bf78ea74bd7a859ffaa7f44ff9181f32
SHA512bb4415f32cf5c3aebff083df4fa481dac4df2d81e0a3a73e89d928a7f71d76a5f94cda78ea99662bda3b54e54e6850e65de986e76d2322f06d7ece7d5526e224
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD532f27a7b4368eb78e7df246ec184d080
SHA1f476e21bdc92fb7b8dbe682a944a020ceefe7348
SHA256323690c6ad6ec1225eacf5c61f645e341b522f9e14eb5167a35ecd6f5ceb55f2
SHA5123af43a2e36bfbeaf7f27b4295450fc470222187cf51012d958d022ef6a0be23b50e9563bae99639973c71bf101f1a5cb617125bb773064173eb5a0fc9d7e8365
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a6b0.TMP
Filesize48B
MD5adeba2c810f4981d1f03d216176e451d
SHA18cd382ad2f794a18457086af71efa59417ce02c0
SHA2564507216f34cfed1e05af7fb4b31f8d8ab8b1410641cd1ae169ac62832db1619d
SHA512557f103c1e2b48b303da45bdd6c400f54f23be87e958e294a8d13538e02d5d0ef3861035a7067b8edae792061b77d8342e8cfaf6b80daa45b9a246aa2e5def7c
-
Filesize
114KB
MD5e3ad2ad2a46523382672dd334009719f
SHA119c898aa2a6448429656a904e9fd23fbb16b6c44
SHA2568375ac6f554753c11925da242784134969e40b7baab25940cf0e1e65d19b4601
SHA5127f6fa5db34580c1662d1e176365b91d44b94006d41f2c3c26642be4f44930f95bee5f205cbae340dcdefe16b0e8be7d57def96510c02677a1adabc0332c5b122
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd