Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28/03/2024, 08:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.kheopsechafaudage.fr/
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://www.kheopsechafaudage.fr/
Resource
win10-20240221-en
General
-
Target
http://www.kheopsechafaudage.fr/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560880067183482" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 chrome.exe 872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 4940 872 chrome.exe 74 PID 872 wrote to memory of 4940 872 chrome.exe 74 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 3184 872 chrome.exe 76 PID 872 wrote to memory of 4552 872 chrome.exe 77 PID 872 wrote to memory of 4552 872 chrome.exe 77 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78 PID 872 wrote to memory of 1256 872 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.kheopsechafaudage.fr/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd4f3d9758,0x7ffd4f3d9768,0x7ffd4f3d97782⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:22⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1756 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2040 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2592 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2600 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4932 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4820 --field-trial-handle=1588,i,4080134606690890053,17665932744136831326,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD542027aa2e95187f74d335067d479c40a
SHA19762b7c87eeb6f0b25acd2de8d3d2aa4550a71a2
SHA2568697e6ed97731c561339c1e556056f7c77bff885553885f80b0fecd6aab00ce7
SHA51242fdab67cc525668135b0520c131a5955f3d08c2b75bc32f425c4dc0cce7a6036f5d272351c34f9b2272ece092fb42e1b87aec3370654fd27939fec41b6afddd
-
Filesize
72B
MD5637f338e14c434db95e20fe3510f7928
SHA1a6829fcea79c19858af46d94e1a03bda53ecf8f6
SHA256e472bae2d0ff707c732319cebbd42ea2e474d93183ddd6ea0b3a426425b61957
SHA51265579dd7c9f20d779fcbc516f09f0647c35914bbe5ef71a66cf266cbed1cd3a94564c0bce17c5065624f8813c8010a6d9fdff2ab3da3a681ce295673021a4645
-
Filesize
927B
MD5928c3a501064b1c369d74b421c3b94c6
SHA14628de1ee6db78c0f5601cae8ef8a4bdfe80cafd
SHA2566f0071a38c50fd10f95d0f0116b8e88f7b33e4789007350267eba3718536a5ed
SHA5129af74f791612d96bc7dbbdbfcc31aba3b1cf8c56a48e8cef64849695c63dfe47f7c5b290dfd6b598617aa4f622b9c339f21429baf4bf8e19cb7b65fbe80181f2
-
Filesize
6KB
MD5a431841c0373ca5929fc2902b93b60de
SHA1ff2b5f464c35e609309dc001e2f49974055dc263
SHA256471458110d2afec7cebdfebe58926783b1b477587032ca6b9421b1a91adec6b9
SHA512699f80288a6a88794659d3bb3f4a4f72d360da83c1233c7caf7581355a23517197a75ef0e3a11838edb2a44848ab60b0f12b1fb4f62e4fcfb92e1409a0e91b87
-
Filesize
8KB
MD56474d0bb0893578428116a353e14f200
SHA127012a29f771893982ef39113522d545f707a1de
SHA25607e5534a47e0e56f16ad5731511d668efb885df9a027ac7560ac64f88c2bc051
SHA51268ea9f99b82c54fa87d19e51e4fc7844508f91e291aaeff0430816f2a582217354b533c8a4f6864b55bea5f35572d190732cd66bcfa06d2afe511fd7de45fe47
-
Filesize
9KB
MD50e04d38933fe1c9c831a891355b2c920
SHA11449d1589b3bad6d5be36b0539523c18e9af1656
SHA2568d7dbc83a760f5ea89757921d86f379ef75992167723fac340c12a88c0c799ef
SHA512ee33c9431a05baf21f7111010c24f1d64dbe71713c4f3ac726ab8d70d056785b7caf77042c0fadefd6a5f2dfb897e25517d4d0360eb685f66b37f5cc8c29e1e2
-
Filesize
130KB
MD511e87f306c2ea1416ddae9497917d8ad
SHA1966a40a8cea227d21d09e2af8a7989d2cc6e250b
SHA256c33d064e9d01c668cf55e4d7193e467e990a0dc9ab6af2e755b5ee689f677fa4
SHA5125946d087ac889a3329bbb2ef3ba97892b2f4c14121eabd5fe6d620555e2a149690b64d7f98dfc832d67a9314e46fd71fcee43da0e4d029d656f7e0326fc4947d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd