Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://positivebanglatv.com/?automation=Um9tYW5l&manual=d2VhcmVlcmE=
Resource
win10v2004-20240412-en
General
-
Target
https://positivebanglatv.com/?automation=Um9tYW5l&manual=d2VhcmVlcmE=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584244461866468" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4960 chrome.exe 4960 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3132 4960 chrome.exe 85 PID 4960 wrote to memory of 3132 4960 chrome.exe 85 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 3640 4960 chrome.exe 86 PID 4960 wrote to memory of 548 4960 chrome.exe 87 PID 4960 wrote to memory of 548 4960 chrome.exe 87 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88 PID 4960 wrote to memory of 1352 4960 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://positivebanglatv.com/?automation=Um9tYW5l&manual=d2VhcmVlcmE=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3c31ab58,0x7ffe3c31ab68,0x7ffe3c31ab782⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:22⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4720 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4084 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3844 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4932 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5032 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5084 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1132 --field-trial-handle=1840,i,1623572526897407075,4944173425640910555,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54466b489126e6023c45cd7ef8079943e
SHA12f93900062f2e075bd434378194154c9ef5fed6f
SHA25615f1fe1461c915fd9d4759cd7e253372dd08321de33a36f70e916c5b98463240
SHA5127f9fed80f05a18db1ebd21196d579c84aa6ff43227765cecf9bc3e1b74fcee9a2938463fb06991b429496307d50f1e64b83fd8425ad50917ebbe69c99ec6bfd1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD51865e0515dd59e18f69ff477022fd1ff
SHA1e1c82e25c1257859b8c476897881bd58a827353a
SHA2568e7f9d4da8bda0fd23268eb087a0965b2ba89c605ee335186a07978cf087925a
SHA5120fdc75a3ef3b76093e24c6bf299d46a9629fa928408ea140a85d78d35519c636e78b3bfa74805182327f7c1c01ec854295ef950378162b666303f1d5dacf5798
-
Filesize
7KB
MD57d76fcdeb9b744415b31ec6190a63724
SHA11bb50ce46af5d56861603f799714ccf0ea01dc8b
SHA2564c54c9679fad16e859bedf1339300fada18c4c04ea353c4411f9d5bcef6d2333
SHA5125b83f3a2f16757d291d89d4958154a89559a046fd79bdc3e9f249f713e9b5a2dc2b4bb8a422b3fbb55df25cc194f1775f522070b98d1c0cab50cc2ae4748a53d
-
Filesize
250KB
MD526c24a4e255b34c76e60de4b2d185396
SHA10f7c581bc2617d828e487e843fb3fb9f1130e0e2
SHA2569b499f197e3bba8526482fa6077c9db01a283593ae63c1ffc09c444321e92cdd
SHA512789b2e694da9f2f5d5c5680d670f3b30aa3a3a282d8d0a44d560716427ccdf49bd62e24d4ce9c644bccee875fdb3565bb56e88089b1a50d9175dfbaaeebde838