Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tr.angle.creatrix-avon.com/index.php/campaigns/fl329j2lx358c/track-url/hl024b9vlza59/14c86daa0b3e7a46a29e55f654130ddd4b80ec26
Resource
win10v2004-20240426-en
General
-
Target
http://tr.angle.creatrix-avon.com/index.php/campaigns/fl329j2lx358c/track-url/hl024b9vlza59/14c86daa0b3e7a46a29e55f654130ddd4b80ec26
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588027672034261" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2784 1968 chrome.exe 82 PID 1968 wrote to memory of 2784 1968 chrome.exe 82 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 3548 1968 chrome.exe 83 PID 1968 wrote to memory of 4336 1968 chrome.exe 84 PID 1968 wrote to memory of 4336 1968 chrome.exe 84 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85 PID 1968 wrote to memory of 3216 1968 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://tr.angle.creatrix-avon.com/index.php/campaigns/fl329j2lx358c/track-url/hl024b9vlza59/14c86daa0b3e7a46a29e55f654130ddd4b80ec261⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8a97ab58,0x7ffb8a97ab68,0x7ffb8a97ab782⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:22⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3432 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1892,i,5262885320958177709,11541044621852736045,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5021ab54ab1b2db78757a1247d857561e
SHA1875426bf9680efc9ff5254cf3c6535a70bc79287
SHA25695c291d983b572a02ea655d47f7d35d5096ec13d20272e14ba2c5667163ef2ab
SHA5126432cc84189c411fe3f5aec4a012d35ff9af338ba552b2367b5f6ddb38e376cf32d6aa7384dbd228872c0aaf58b82d32bc8b0feb4f7ce50d54a61705b7e5a624
-
Filesize
4KB
MD5cc471a888ba43d6e5de30c0ee8ab0d72
SHA17ffb261bfabda3fe6b1d51af8c49abc934f3d5c4
SHA256d198ecbed4685de4ac9b1eefc02ffd06260a55cbcbcba5a1aa68a786bf08860b
SHA512f6a9efa26f0187f58b977789621d6776619258e6d0e940fad2d327087ce2ba1d3166a12fc82a9f2349b748aca9260a5bb2faddefbfaad58027f015e37861ef6d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD555f9a90810c90a8b4729140c88e63c64
SHA1faecff3fba5c06067936006aaf0ef952c03a43c4
SHA2563bc3f77858902ab24cf7e919cbdc744db1f5d1321440f11a5867742735cadab1
SHA5120a28d250b471d0ac190bd800a276a57e9f429a601b49c55394752f4b2578e135019e6e069a45767465fd38bed136e286e89b4e76ec2201ae1037c5891e20bcca
-
Filesize
7KB
MD5d1911ce4711c56c6fb8904c32c25331e
SHA1464031119070ffbb40ebde920a356897c47d908b
SHA256ea0a65e9723c70b517fd83e074dea5d2051ae165ea7b9eac788024d9ca7338da
SHA5127300f04b4ae938d37a644b87090e75ea19101ef7c023171508844074371f39c232da717d2bbd79f502ee7baf0323739249002e00966e87df909ab4c852f4c167
-
Filesize
130KB
MD5d893b5f0ae4f65059a906740bc265c12
SHA1b2c2fc8086015203d852b9a77afb6718b1ae47d4
SHA256dec1504f9c488ef8c9aad6a489cb30bc50153302f0cce7767062fc0648b06fcd
SHA512d58dc607f6075c5e5299f3df85b9536a9dbed9f75b9bf51a7b3156f3350cdfddbb8dfdcdf3b68e9c3d2fe093cff03c1f1ac3f8cc9100be62243df9003615eb6c