Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
209s -
max time network
195s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
22/02/2024, 22:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://5.imimg.com/data5/MY/Rfq/2023/8/330766013/JA/UR/FK/187076539/burenipelobotutazujar.pdf
Resource
win10-20240221-en
General
-
Target
https://5.imimg.com/data5/MY/Rfq/2023/8/330766013/JA/UR/FK/187076539/burenipelobotutazujar.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531155843733688" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4000 chrome.exe 4000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3960 4336 chrome.exe 68 PID 4336 wrote to memory of 3960 4336 chrome.exe 68 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5088 4336 chrome.exe 74 PID 4336 wrote to memory of 5108 4336 chrome.exe 75 PID 4336 wrote to memory of 5108 4336 chrome.exe 75 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76 PID 4336 wrote to memory of 3612 4336 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://5.imimg.com/data5/MY/Rfq/2023/8/330766013/JA/UR/FK/187076539/burenipelobotutazujar.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb163c9758,0x7ffb163c9768,0x7ffb163c97782⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:22⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4440 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4600 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=928 --field-trial-handle=1588,i,5811622923324902219,18156494925852811688,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bc8d088762e1cb4b8508903843545e00
SHA10044b6e4883d85bfb983abd1df4a9da069b815d8
SHA2569144416f44d9310515ca61b2a9e243a7e19abc4e139865f6a8367adc48360749
SHA5121bc092e36ab1c412a5019a24c563891e50209c23ebc05764e71a4d40890ae972b0b1e8dc6b8abec37e54592fcb390028e68ea9889fb18f4c65014f77845ed1aa
-
Filesize
5KB
MD5d79cbd573ce01cc2dfb42f8bbf8ac5d4
SHA141fa4827735a3e70d30159e415160cc941d945a2
SHA256232f6be3e1c6d55fe4fef676072448ec813b5ace65420d1643babea3311e5ca1
SHA5122a8922ded70d4ced280eacb4103e3e1a063f515e6292c9ad788d652b926804bec02cd3f791d690ff8c25981bd5328e05b360b595588a241233de027915ee52ef
-
Filesize
6KB
MD550b732b4977c0a035c8e2277e0638095
SHA1fe290d63737e64240e78fff9dfe0d561130bf2c3
SHA256728588a77d037c03b344f55437257755240c8bffda427fbd3a7ff64f57fca722
SHA5122d691b5469d719dafe76f49d3faf5a1b368d47e6aa5491f0a4025811b3ed5c554d444b9c8f35be6f86620bef2f6932615dad1c8437106ad5f7a8931192623950
-
Filesize
5KB
MD5f3eb8c89f42d3592afe0da109cb0ab46
SHA1ba005cbece6a26aa85a16d250cd5f31daf553fb5
SHA256d09db1ec0e19bdeeda10a11d02c26822da6c58ac3406c1df341e9650eef5724b
SHA5128fb9410e012ec2c3058f8f124a87318d5ecf4a2193f2c5994e8cbb56adb6ed53e2410a5ce42b639ec33573a34085b3bc1fee2e4b24055d1dbdc8cdde9c17cfeb
-
Filesize
130KB
MD56c0b33be74ed3d4fe4ddc83fe59a6f23
SHA15a01cb24804c95f62bb6e32746901e21885101d0
SHA2562350c4902804e30202a113a843407c83bef2ec652a1f58e70859ff79050461f9
SHA5121740071f64045dd73311e94de06ba06eb35bec004b938b4d4e11c7d400a5995e145cb57f9da11121f6a3b8379109a5aef5848b417c502246c27b64c1f4550624
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd