Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
284s -
platform
windows10-1703_x64 -
resource
win10-20240221-es -
resource tags
arch:x64arch:x86image:win10-20240221-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
07/03/2024, 20:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://activacion-clientes.ubpages.com/
Resource
win10-20240221-es
General
-
Target
https://activacion-clientes.ubpages.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543155544489783" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeCreatePagefilePrivilege 2972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1324 2972 chrome.exe 72 PID 2972 wrote to memory of 1324 2972 chrome.exe 72 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 308 2972 chrome.exe 74 PID 2972 wrote to memory of 3988 2972 chrome.exe 75 PID 2972 wrote to memory of 3988 2972 chrome.exe 75 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76 PID 2972 wrote to memory of 3768 2972 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://activacion-clientes.ubpages.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb4a709758,0x7ffb4a709768,0x7ffb4a7097782⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:22⤵PID:308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:82⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5192 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 --field-trial-handle=1832,i,2298720375996888197,9836261379815978411,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
Filesize
168B
MD5e5b45f55fd69eef6b89ba77ebd3da037
SHA1821aeda908ddcc01bb26a36bfe174d40bc63382f
SHA2569011571a0dfef51c73d58c04881dd658edd6443423004495ec7e5c9367f95716
SHA512e5a522322c62dc84062d36152efcbe6300137da71f76c5bfc4d0d89256f04300b5a1f69188c8ea0b0657ef9c4a836ba60a1334a7948a09700481f47fce2af0ae
-
Filesize
1KB
MD520a183b3fe55f18d541f0facb537dc1e
SHA110b5706f5c75d096047f6f06b661daf5d7dd88fa
SHA25632d1bce2c5dc66b2e997d8337ccf1fb6231a25911537397e18f12fa5beb5595a
SHA512a34e96d7a7bdb7b1d12a488b61bbd2a3b321dfb36e0e044a475c2d95c8d71de09b5b47d04478ebee49522c9ceed60063ea81a65b18972cdb835a0416632d7c20
-
Filesize
2KB
MD5526e432ba361592884907d20201f4776
SHA1589c5d9cc6941b2eb998918fdedeacbacc5aa083
SHA256e90f8b5f880a571e5af200d888bda4d0012425a4214aec27ca464c2b717290ac
SHA51285061847a47a995316a714eb40a4ab92ac802b66b034c9411ffedb2cb81ac1973a30c412766b49345fbd190440b7b3fb47b1696fdc3eaa1aa8d24649df172e8b
-
Filesize
5KB
MD5d52e6b30516789af6378c1e200fb7ee8
SHA17bad5935fc9166b347e8ba78379bd3e66d113b84
SHA25669d37e195f661793bb5000e5f61bf7b11f16bf5ee4e89771d83a98ec8238b94d
SHA51227d02544e82215f41a8bc940aca2473ee74791e41742b07f254c6135343c50df92965502fd928feaa66035bcc6cf24e6a1fff1405d144aa252b15a8c600350ef
-
Filesize
5KB
MD5cfc28f7aa9a96b3814c5023bdcc5928f
SHA15ea1132d8e81edb4c522dc24a15426d8cb9d4063
SHA256023a24b4fd41cccba0f3ddbf91e31c8db1908b1d6930fdc520122c47a6f5f9d4
SHA51275e426d1135b0482c85043dd414a1ac186d8e958384c133d0686e54bbfb5a17a926e153da60fe56a505479358dcfb501239ef9c130f502392d7ea502019b3113
-
Filesize
5KB
MD562f4d353e1c13eaad05150061f9f2834
SHA16556250427add6582290fafadcdb268577059b86
SHA2566bf9e7bc012df648ff10f992c623a2cdebaea33f03be8ca3ffea0714f46b47be
SHA5122659f67d8089e7b001d0fa06a241e3fcdb1474414510aa79ae28b9915a649e721c940e396af9d80333cfdded4695580b85b7b31e115cf940884a68119fcc1cdd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\be487aa2-57d5-48fc-a099-f3fce0416ea4.tmp
Filesize6KB
MD5be002c2bad551b92315c12f148ed98fc
SHA10835565dd65d455716ce72f1f9589f0850fe732f
SHA2569f196b218f85a0f1e6b28b74aa19d3771e892239eac32e2ffe41671a43a5471c
SHA512f9028c305cb34cf316065e60dbd43ce20baa0ba03b9b734da00fc93c6a649162f40d0720d57ea1a960a394e2fee734ab42cb7dc79048fbdd4689abad2da378ed
-
Filesize
130KB
MD5de4176c0495ede116f37ff70a7322159
SHA13461f674237f073f440a0588148523c6d582a799
SHA256a9309a664a1a2ce7cdfa26cc269b8f27a38e59f314db28b7a265f79186ada236
SHA512cff7ce6ff14be26ad0c079a47a7c033e30ee66e07f25db0d2d89c1f85af0c6cee048fd7976f7703576785018900a50af09faef2547c16dc1be435f368f2ede9c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd