Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 22:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bcomb.net:8080/BLyec8dL10iMiGxf7A86Q9uUZqda
Resource
win10v2004-20240226-en
General
-
Target
http://bcomb.net:8080/BLyec8dL10iMiGxf7A86Q9uUZqda
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133544116221425195" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4220 3468 chrome.exe 88 PID 3468 wrote to memory of 4220 3468 chrome.exe 88 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3668 3468 chrome.exe 90 PID 3468 wrote to memory of 3036 3468 chrome.exe 91 PID 3468 wrote to memory of 3036 3468 chrome.exe 91 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92 PID 3468 wrote to memory of 1872 3468 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bcomb.net:8080/BLyec8dL10iMiGxf7A86Q9uUZqda1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2cdb9758,0x7ffb2cdb9768,0x7ffb2cdb97782⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:22⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1864,i,9598640466890963607,16728031513559517849,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb934b358db4b61474edfdc75506f686
SHA1b73d60312d9b11a4f785bb1a43fd4384679e8fd2
SHA256d1a986e2f6b61318bab580db289f8b85903fb1b84f59fc81114ca923c2e72e62
SHA51225d4d9cf9478cd97dc13142df68d3ca6445415b9c7396cf55254a3f8b0875ac2952f7a10b357cc92a97ac8c024333a1b4a439cf9af76a36d6589ae4c7ff2b182
-
Filesize
6KB
MD53d7099f0f89bebe8394869d931c9b035
SHA149a448be0437b73ac97f2ab1123b2ce77ee3ec4d
SHA2568a835862c89d40495622950e38289a1e54aab8731ac81eae093388a0dc358b8e
SHA51229c428368e6b83a7254d72db9d24a18497d9f13458b4a28373139835fb7f1717f7cc2aa2cf24ec67e7b513fff521ce1e509a63c37b801f85b4110fbff9478ef8
-
Filesize
128KB
MD5e2bc2e8639f3e8ca7b0e8328e4a27877
SHA1ae8068ce15aa2427132bb0914d3cd7c4d73fcedb
SHA256a03d1867a0b5196afdb968f0a86634470f16770b543e5df85859a1b7e5f52c2b
SHA5122c2e42ebb718e25ccfd0b2d906adadbcd185430b9db8332147f824c8c4dd8c8f8d5efac86c3927eff29426aba8ae7725dded14fbb998d85dd2e9a000bc8d45ac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd