Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1891s -
max time network
2616s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 16:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pastebin.com/kPKVRBmy
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://pastebin.com/kPKVRBmy
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
https://pastebin.com/kPKVRBmy
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 2 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598323620043346" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 4880 212 chrome.exe 81 PID 212 wrote to memory of 4880 212 chrome.exe 81 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 3920 212 chrome.exe 84 PID 212 wrote to memory of 4860 212 chrome.exe 85 PID 212 wrote to memory of 4860 212 chrome.exe 85 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86 PID 212 wrote to memory of 1504 212 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pastebin.com/kPKVRBmy1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99045ab58,0x7ff99045ab68,0x7ff99045ab782⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:22⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1912,i,15489433431453702723,5632985544272591190,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5f40f19612c495faca05a585c910161c6
SHA154c80642840a855c153bdc45ce632245dbad4818
SHA256b96b1689681cb2c380b3b889955a91f666094364dcc3ce8455b61fd0624036dc
SHA512e572b2649b1376ea64dc38966563963ca39a063673e5d8414973b4e6da6d0c9c29eb2bbad013181078587b4ca8613ee112bd35ce5dc6b4cb9940b414790ade69
-
Filesize
192B
MD5719613fae7b9e37e6422918b7755777a
SHA1d57020ed28cd640fcea0df2e7d168c23caa8f25b
SHA256969d86a1dce97e52c510b9840f1abd6712d83e7d7f62d49f56a134aa8a865b7f
SHA512866b4c6c65ff3badb343d1b42d71476844006ae845e526fde48c3cb47b006462913b5a84e9cf3e7d6c662f9d8b194c1be6d1f1fcef8459097e9a971b90d92cda
-
Filesize
264KB
MD5792bcb58296e0db6fd779e0d14d428d7
SHA1c7db731c9ca9a551d83b2a9d4f94db76c81ad645
SHA2567a3976247911a36421280edb1e1ab4c7c3aac8479d81a045985eb451899023f7
SHA512632997c784debc836ebe5389821ce5d46341d6f6f7f4f495dd83fb4f28fc3b55951f2f0357b9a46bb800101560098f911d20faa5eb4a6feadb6c7f5f200cd6a6
-
Filesize
2KB
MD52568cfc506bf12c2ba938c8c33359c98
SHA1cb9243fa9a8ff62c2e22a800358a6eb150fee654
SHA2564be0f72d073d4fa0f454a01f11b46a3417938bd01f08dddae43f716be28b86a0
SHA51238c15c3ad7027735ea1cdc28f5ecdaeaef5b0ebf7317f98f594e7f516c7ddec71bf5eb9c494a7bfac761b3c48af001ce5d35c141ad75fc03e085e7bc15d7090f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
519B
MD51accd1e16db07791804f935dc43c3304
SHA153e97f2245c761b9357a3078cd5b45520dd8c5da
SHA256dc275dadb868412422381843ddd7f5eae93a88f199b5db3e40fadbe433d61e2a
SHA512982f7b3a7882f34638566107baa43f955013639d3d55903fb1a47f7dec733eb4892f5e1b3399472e5fa27e388d0a90c01e8b307a309a36b59e5a1a6a09624f1b
-
Filesize
7KB
MD57bb46184b0925aae9871dd72fd0a9ccc
SHA17e955522a84659da60506293420a7648cd32f935
SHA25605ca387aacdebbcfeffd46dabaa1289a780fa4890fa8366b2d1197c8cfe2e621
SHA5120f646adc21f80ba3b91ea07eb7ce06c123b0df6e5b007c95e3f22af90c99113905608f96b1449718e9dcf03babc015c9818d93d1a423167f81791563b8bd5b5e
-
Filesize
7KB
MD580ea3936e8fba6a469c09da9e6979235
SHA1da9645e86f1e59d5d8b27303cfcd03e508db5a3e
SHA256eee7e7fd5b12644deee7a95a7e38b1ecf5dfbcad828f267174e9d9f19294ff4d
SHA51244374fd932b0daa08ead98ded427220b58122933866bd7c4326d819a44e05751de79949aae84b62b2716f918fa27959938c967e624fb14b948832c7b17cd63a1
-
Filesize
257KB
MD502c9987275414936675844afa166b861
SHA14fafbdd2365a4bcd264e55b646e0e6136d8ca38a
SHA2567ef3e62d1e9ad0194c37954b3898e4959249440c27dd1ca8cfa36361f6d8d634
SHA5120deb19973ce23b6aec1aff9c2fbbf82f224f18b2e38baa6ac71faadfbee90c2e887ff49304b853c6882dcb86a86830af23621b9241e569fcceee72d64eb3fef0
-
Filesize
317KB
MD5f3f74d114ddd46fea3dea2beb2586361
SHA1094aa07261bbd2b7fa7bcbf17edcef71fbc79ce8
SHA2566b87ba04b055550ccd216131caea8222755e5dff8155e6cd0f5213022e01c702
SHA5123168aadbf60143f43a769c969ae20b0b363c9c6efb0fffb1c2249a5acb09cf0debc505ad7be6a75570fc4d7346ce60888564edacfea686af16299e26dd189c67
-
Filesize
307KB
MD55b0eac8542e47a7b63825e3e1c077247
SHA12cb472d947aaadcce19a744f4352dc6180c280cc
SHA25672b232c35a90afbb964017186a680bdb4e183bd960f16349d3d1fc9cb9d07cb1
SHA512cb0797d4a0aa3c4b69b4c515ce9a6208bbd9ffe9e1c1721c8c45da6260e6f3f6e4a82eb9c24cfcfc0891fab83ca18c1dac5486f08f1ba0016daf6807d7803e83
-
Filesize
257KB
MD548310b1d2bd69c7df786c9c951b1999b
SHA1b66ce0cb39dce8a06f3d7d79086a298e38f25db7
SHA2560e9fbe83d1e2ee84d675ad975deec11c6224ddb93d98586e09c218118d4a3bdb
SHA512552cbad4d4981842f85663b39a2c4a2b52f6436be74d4c61dda28b7e75e03ced48844ea858423d8ec739a96db8ff2f0c64e4f2e43c06b8af4191c823a98f397c
-
Filesize
91KB
MD502afd5033e110e8aca64bb82e0b056a1
SHA146c0341089118cf2f09f88c1fc38265b8d68ac9b
SHA2565ae25d4ab461cb30c685fe8352277ad25c88b618ae0361d772f42b3acea00ba2
SHA5121dc81d52e09dcb3c4f63fac6999c25680dc393d692e579abd11e8f25cdf3445dbc837e9cad165940cfb54be837902a63abf8c6ece081f11d518ddaca9adac9b4
-
Filesize
88KB
MD5827829db76772cf0a18ced944a354d9f
SHA1deb3d1436e7e35035a9ac5d7d4b1dd82d5bbc8d8
SHA256ee632b9a54b478917e55953111f1c2d6d2fd22a49cde6c05e92107898de9ed7e
SHA51259b74941ac2ba4cfd34ed1058e3979d425050059a1096b19255b6cb9533e0683333bc24e1c37100a33785e7caf7c5e7eab32de3827fb80005c9e5ed23940daf4