Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 07:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.tlhyd.ramenrradn.com
Resource
win10v2004-20240226-en
General
-
Target
http://www.tlhyd.ramenrradn.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601442481528099" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 3432 1184 chrome.exe 91 PID 1184 wrote to memory of 3432 1184 chrome.exe 91 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 1016 1184 chrome.exe 93 PID 1184 wrote to memory of 4908 1184 chrome.exe 94 PID 1184 wrote to memory of 4908 1184 chrome.exe 94 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95 PID 1184 wrote to memory of 1480 1184 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.tlhyd.ramenrradn.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98c009758,0x7ff98c009768,0x7ff98c0097782⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:22⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3928 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3264 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4684 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1784 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4612 --field-trial-handle=1896,i,14283050658060331552,1360946876127976748,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f50bc722c61f6c5782400125b60a0703
SHA10599ffc106265aefe9ec38a38c238034bc785db3
SHA25697a712df1a806a7b08a034d40c3000548118a60e45100cc06ad6cd71b08dadf0
SHA512d38e3d0791d43d865f09c0376e37a3a6d58f43f3bc84888976fe0fbb31eadbd3c2f8262b53fd7b1f804d6201738b9958d1489d486651b972246905e461988047
-
Filesize
5KB
MD5abfe27e4c62acee7ef4cdaa96703957a
SHA1e146d6f6cea89f4d0c452f92831a8f7e06657695
SHA2566b251d8195ec1bda3bb52909b609f988e87da9adbebf40d5e79dfe47a4409edd
SHA512c5ead515812d90cac170f16c6be86c1dd0444f8d6733470ad38b5c3f89af6f3e37c0720849f5cd32164fc79b1a779c1bcf360c27439346edf4d32b3cd1b35c38
-
Filesize
5KB
MD55b0583a2c4025e92d1acfe4754b39b0e
SHA1735b5347f7d607432826cdaf78de0c652bc3cbda
SHA25673d83f0679cee9c0eb2e7a6dc75d3e73f3f210281fb4fb57361e44e66cdd136e
SHA512b2013862d6d81415e7c45a9c32638e5208b5c35d1c02e7f120402425d0c6b4c4b348bc2cce86f80edfc80fc58806a51f1919c9d8551aaa2a770fa9c668d0802f
-
Filesize
128KB
MD5108292393626dc8dc09909ab806b97c4
SHA1d76602478934658542a6c82ff26583c9a7b8e7e5
SHA256e2ce432508daad27d50830ebc996ab62146df1340389324bf2fb3462b9a1ca3e
SHA5125e13d602666ef180b595db0fadda93ec16831de0f1be3ae3757e3eb049e236342634cb547ac894d28918a81fa49428e3b95bdac361beb1247b1c82ef7be0821d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd