Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 23:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pl.repi-us.com/+?y=49ii4eh26oqmaohl6cq38e1p6srj8dpg60o3ed9h68rm2cp2
Resource
win10v2004-20240226-en
General
-
Target
https://pl.repi-us.com/+?y=49ii4eh26oqmaohl6cq38e1p6srj8dpg60o3ed9h68rm2cp2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546729304671192" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 220 chrome.exe 220 chrome.exe 4548 chrome.exe 4548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 1364 220 chrome.exe 87 PID 220 wrote to memory of 1364 220 chrome.exe 87 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4816 220 chrome.exe 89 PID 220 wrote to memory of 4148 220 chrome.exe 90 PID 220 wrote to memory of 4148 220 chrome.exe 90 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91 PID 220 wrote to memory of 3700 220 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pl.repi-us.com/+?y=49ii4eh26oqmaohl6cq38e1p6srj8dpg60o3ed9h68rm2cp21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff813189758,0x7ff813189768,0x7ff8131897782⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:22⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3852 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1000 --field-trial-handle=1904,i,15297159033335801146,564113409523682446,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f3ba9a70c0f1d08ed3b3f54c6a891dd2
SHA1e3a29b730499fe35b136ced1878671dfbf1f5920
SHA256f597736cdfbc3f85f93f3a38a6aa553eff53772ada78f61800b821ee9cd6730f
SHA51203bbaa46475ba53147444a3620dd12566d923633c1d380cfb3c4861afef4ce6ef21e46fe697ae8f111d629db9beded8d2d7b0f7014875a2faddc5f9d1552e3c2
-
Filesize
539B
MD5cdc3c318212f10f479a8ec6d50ce02b7
SHA1d80676e6572e09902fbffa4827f56d1d9154259e
SHA2561051e67c97a6a3821d5dacdcd048c2e388a601b1ab1f006d6f0556378ea8876f
SHA512825c08f08cf399892efb53c8dae10168596eb1a5d0d94449fc0fbb72a8affa1875f801495d3a00506a2664ab88529bbd586a6433127b1627c33ee5a128351230
-
Filesize
6KB
MD55aeb28cc2fe4e2ddf2e92d6aba8f4021
SHA17117adcf5a550beecd1391be0a8cd1e01918a0e8
SHA25667ebbe4b16859d02b90213e49690c322bd1bd90e5daa369f786c007f36808613
SHA512a080c797ffb5e8cdf1d9972e3afc5945d7d715b18f583d798d40a3362c3d21827dc5943e562bebeeda902eb4f44e5f7fbca6348a0bfaca5cf23355450ec12fd0
-
Filesize
128KB
MD55ba01297bb0d90bb31b75954205c7154
SHA1c097da476a188df6da1c1ab837986f7fe2974d91
SHA2569c3c31006468734c1ddf3b03b2d9b6627eee8112a73326967fabaa3458361437
SHA5129c37ab77544bd0d213bad1aa2546085ce97e92a95cc6d6e19d03d56cc592e4b0feb8fb9386952501d97dbfb1040b49ab9af1362e5cd6014e68cddcba48abf6f8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd