Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 03:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://festelle.eu
Resource
win10v2004-20240226-en
General
-
Target
http://festelle.eu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548610643877240" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 992 chrome.exe 992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 2248 992 chrome.exe 88 PID 992 wrote to memory of 2248 992 chrome.exe 88 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 432 992 chrome.exe 90 PID 992 wrote to memory of 4696 992 chrome.exe 91 PID 992 wrote to memory of 4696 992 chrome.exe 91 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92 PID 992 wrote to memory of 4656 992 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://festelle.eu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb0d89758,0x7fffb0d89768,0x7fffb0d897782⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:22⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:12⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1868,i,16991248026590927565,5724697205154652893,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD592652c50e2a3589e3c8717708d08693e
SHA18bbcc99bb0ae6c246be555fa123df4cd69b0ce5b
SHA256e111230d2f102b4aa7207dbc9f8fec0e5d9349aa9402ca3b87ae48f6f155a742
SHA5122040a3a3217ac61906505a3334ffc6e5daf548120fb2f093e37a20e68345edaf0c187d2fed34bb52c42443988200a327f036f0c9e11716d61de0e9cd17db4cd0
-
Filesize
336B
MD57fb37c3db58c82e032d0fc7bf85e6b82
SHA11bbe54736e93b0490e7893cd7150a9176cc0006e
SHA256460dcf26e456bc41bb3230253bdabb07a1969c3bd7fe482c72fde26e18b302b3
SHA5122c96f8190faa4aa888590c863bee1c6fb8b392a9798cc623ac8896a61c9242dc937ff60c099f49e80edef1f460db98910fd105b6a0f06e7b409a44d08168196b
-
Filesize
1KB
MD56b990e362b15f03decf3889778be9c96
SHA16ce359566002fc679a626853137512015c3f83fd
SHA256e3898d8aafbbcb92d71a3fd6fbdf30c1b0e46d4c787a2f3bea9ffcd0e24688ce
SHA5126e36ad73ddd54bc56af99ed337e36c4c9bee72068416188d69527201b68d659ef63a0ffc40c2cc1e078fcbccc43088ddda40d28749820ada11b214fbbb02f471
-
Filesize
6KB
MD584779fda91c041c9da93ae96f10e99a1
SHA1534520dd6b2456d8efd6c1cd506eb5bd1d86baf2
SHA2563ba1ab9f00549ac98e842c7c48b06f0c589881e97bbfdc569a318d75b55563c5
SHA51285c72725a058e533f319a1740ce83e04102f05c12dbac054df1573f92d951862afb66d5dee19ef97693ff8ecf9ec42cb14d1ae3ff1c63375de03afa89c2162d4
-
Filesize
6KB
MD5fdb487df507b435712fedb2ec9848009
SHA184e8a68c22164ed89b9e9617262e124a4d4a2d25
SHA2561f5f96863ec0d9503051517150c7d1d6b4de094eba65eed1e789deb23e803f40
SHA512b3310a027f27d1489e644952c322164e4aa01fa3f91113afdc1ca5396b7a06bb02bf1b862ab00381a9e09b79037457213cd11a874fdb392644a1ccb4e2180eaa
-
Filesize
128KB
MD52506ffa5c2c1186e4ca7f5eddcdd83e6
SHA100754cfdfcb8c0ef69dfd47a672b86f2a08e4f7f
SHA256c66600aa936ebd5007ada39527b43319ec17c9760343ec790d358e9c02c34d4c
SHA512055ba1259af3b1ff446529975c9c12068db601852c1166d5836f217cdf4ddc4460db36294d2d56446628f8cf4ec147a8056718b18f44d440b8d8e0fbca79afbd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd