Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-es -
resource tags
arch:x64arch:x86image:win10v2004-20240412-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23/04/2024, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://onwfacttasunslahf.norwayeast.cloudapp.azure.com/?_task=mail&_action=get&_mbox=INBOX&_uid=19101&_token=rbrJMXNUOQvrlaWOOxGAyj7vcufaFN3r&_part=1.2.3&_embed=1&_mimeclass=image
Resource
win10v2004-20240412-es
General
-
Target
https://onwfacttasunslahf.norwayeast.cloudapp.azure.com/?_task=mail&_action=get&_mbox=INBOX&_uid=19101&_token=rbrJMXNUOQvrlaWOOxGAyj7vcufaFN3r&_part=1.2.3&_embed=1&_mimeclass=image
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583531601132044" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4820 5048 chrome.exe 84 PID 5048 wrote to memory of 4820 5048 chrome.exe 84 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 3164 5048 chrome.exe 85 PID 5048 wrote to memory of 2984 5048 chrome.exe 86 PID 5048 wrote to memory of 2984 5048 chrome.exe 86 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87 PID 5048 wrote to memory of 4156 5048 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://onwfacttasunslahf.norwayeast.cloudapp.azure.com/?_task=mail&_action=get&_mbox=INBOX&_uid=19101&_token=rbrJMXNUOQvrlaWOOxGAyj7vcufaFN3r&_part=1.2.3&_embed=1&_mimeclass=image1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbe05ab58,0x7ffbbe05ab68,0x7ffbbe05ab782⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:22⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4048 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3268 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1936,i,16053170022352164109,11275429600738610908,131072 /prefetch:82⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5fa672ca2cde11eea22b38973de832a9c
SHA1a6e58ef9a36ebf705a3a72c895247267c02e04d6
SHA2562681d8b255fa32a035bd5a982cc611b508f4be11efb2bc6b66170e7130c8b8a8
SHA5129736277a691a9e5d373c0628109ecd171beb44a6be12b2fea486a5f059c4c1cc26b561dad87e2bfc6d39e0384164939192d58aef6936f69fe997299a024e380f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57aa05fed420f50a3a627ce3c1ec62f46
SHA1486bde2bcf3163455321e7725ccbe6cb23c67fbb
SHA256ae51eef3ca0a3de644fa16c9193a3a0b359f235be1b86640e92ad7e187137d29
SHA512749e35096e915a6ccf3de372479eb684e0b71595315fac6fae9107b8f8ad64c1e165db05712105148f84a32b446b611790555d32be381210e3e89027a2f4c78e
-
Filesize
7KB
MD51c6a242a67d2922e6c7157fc1d2a4a68
SHA133c97a4556f0744406abe22d8a215826aaf11af7
SHA256b30f880599553779bd00e42fc9cf8f8c53eadeff7995833fe7318d5ba48c28b5
SHA5125bc4f15e1d79780e5bad08c7926385b2a5af9bb25a979524cac8dc20e9035fe87563aaa18bd5c4d85cf9b1faf531f9fa7e8f6d13df952f574e5915ce37114e4e
-
Filesize
252KB
MD5ea0a5c03b34a09b2dce940da011a75a8
SHA1fa8ff1c92d438c0146e9e1e490c8b39395b89be0
SHA2567074dc0ec8cb50d63aec5a598aaec3cbd24f5475446964b75f81f5c8c7cd25b2
SHA51281aedaa5f3600052cb2ea46ba30f62c8cafc04fb8c7e8178eac9d90641a8d411cfc2147270da8c4730e90238366ce6985ad9849ea65212725fa3ed2f5347967b
-
Filesize
252KB
MD528f8a6caa02436ba698f9bbf831e8c21
SHA18679406a179fd120c20bcfc7cba9b447c8a3af74
SHA25616600f2c7a100ebb9e7cefba7a3936b7398cf8c043170d18128494e981ea8a4e
SHA512521c65da0929e2a8d530d1b9b3c974f4b27c28cd572b0e1679b9b6ff389a746f9c82bd7dec3c80f6fca72762ddee97170b6db3bbd0db578c24d2a1e71c36dc5b
-
Filesize
93KB
MD5294bc50a250a8f203ccc78d572ea40a4
SHA126092e505519111fe0937a40c640a335ed55a997
SHA256583811e620cf7d1d63091d5ec44cc9f20f6f6b376703e9b1f448f3cd7c2b7fbf
SHA5123e45cdf9e8316b334abfd40307c2466e7ac9e60e01b5bf0fed4d4561d52a75718b72fcee9352f95e74594012917388ba155d65d70f0457650bbe4f6ec056bab1
-
Filesize
89KB
MD5a4fcf21ea09cf6c92b8a848be58f1200
SHA19d8b5fc19d819a84c44bbc4d14d111d211a001a5
SHA256da74d206a526998cad51cbd99872acdf13607ef9586bef6282bf12f36a42457e
SHA512c9fb49860ad9802fec787121d075e9dcad8f6529597b0b9ffeab96c085790f534a28638eb7b2a22012eee8bf10455d88cf0852fc782f8b2b32ae45b294816202