Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1787s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/05/2024, 09:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://install.kontur.ru/kekep?xuacompatible=8&backbrowser=chrome&fast&back64=ahr0chmlm0elmkylmkzhdxrolmtvbnr1ci5ydsuyrg
Resource
win11-20240508-en
General
-
Target
https://install.kontur.ru/kekep?xuacompatible=8&backbrowser=chrome&fast&back64=ahr0chmlm0elmkylmkzhdxrolmtvbnr1ci5ydsuyrg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133604134577654413" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2656 4924 chrome.exe 80 PID 4924 wrote to memory of 2656 4924 chrome.exe 80 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 2552 4924 chrome.exe 81 PID 4924 wrote to memory of 764 4924 chrome.exe 82 PID 4924 wrote to memory of 764 4924 chrome.exe 82 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83 PID 4924 wrote to memory of 2936 4924 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://install.kontur.ru/kekep?xuacompatible=8&backbrowser=chrome&fast&back64=ahr0chmlm0elmkylmkzhdxrolmtvbnr1ci5ydsuyrg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xe0,0x104,0x108,0x98,0x10c,0x7fffa87cab58,0x7fffa87cab68,0x7fffa87cab782⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:22⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2152 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:82⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 --field-trial-handle=1744,i,16099303751866131813,5014467954965508889,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD58568f2be41a824cc1e1cb7deb0d0e8d3
SHA13a3de5eede04856a0c055cad115ee92ef29f75af
SHA256aa2d5f32f5bd10f2090c5e176eed1096a3cfba271437c38e93d6db110369b28c
SHA51276cc4b3a67de331cb36942d8ef5e42fc653f5c7d14d8c6c4b23afbd8bae5e5e1431c99b5b7c1a1ae40fec8bb943d8775234a654c91047a0e4b41f58faaa3449a
-
Filesize
984B
MD5f00b820ccb49f437e48ebaff74f361f6
SHA1131674adeb7bb02a0aab8601fdf8cd9f47e47c23
SHA256810fb88d1b52761e4148035bb806faa63d56fd463d7b7f394102ffc6f5778e30
SHA512622d4fc751a4ff514109e25984b175465d3c8dae51a47d09389f345019d59e723d54da98d23b34412f9d03a30618cf9859ba0e2827391bbe5c4cff778d0749c6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2KB
MD5b890bb3c0d5050644dcf4aaab7e21b5c
SHA1ebf606754778f4c6540ab40692a90e5762855f58
SHA256bd39817fd4aea580a8f2345d911cc4f79f0598804c092736c0414a82d70d6dd3
SHA512153e3b925addd60960c1eff9dd3036758ce79cfb43e2cbbf0bbd4025bf52ddee721b1ed8f2218d663f236274406efa88778738d3499f170970fa977be1a8ac35
-
Filesize
1KB
MD53755c06c0b11fdae7b1cd61a851bd04a
SHA1c90f28b9e35f59545948e7a29690f13a47ee806a
SHA25615ab82e490fa8e28fe8d4f9487a5eb51c189988b6c6d3cec7b5b4975b08b8473
SHA512bcfcf14bb4baf816b2abc7c5b6f6141588746fb1511c2a9ac5dc2385da7f96d43f9892d31e9a33ddaa884074a945c5745d21ce42fb9e75f7a9fa58f28a783670
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1020B
MD5687b42570414543a59a2099cf57bd0b2
SHA168459abe35f1283286c0cc9032d4095d2bd3a7d2
SHA256265495281b1ada46b1c757ce2d204f9c9e1988eb9ff41046e2eaea97ea082d79
SHA5123bab4f4b939c0a1fa9f558129117b458e6efa85751bad4438ff091b162bbf3a5324f2fac17ea046ea58d94414a166026492a33e5faf5ad68b529c52e1e5a2922
-
Filesize
1020B
MD5c05c7e17ae3893c50c0c0d3e1390fb70
SHA144ed95ad5473e2353bb3fde1d7afb53735fbb72b
SHA256aad708ff17a248de7d99bfca10afd0b4c12be076f96ae411ff0464d7fc393ba4
SHA5129d07f08b8576874d55589b6f5d1df380afb1415530ac00e04b396f9cb64b2788894bf0a2bc69ccc11cba06151545da0ff6526c0fc10d4f153186437f50f43c0a
-
Filesize
6KB
MD5ab7b375f7465524a40eb2c66b1e3a435
SHA1191eaae7d84e686973d47c817e82da9b4f13a76b
SHA25641202fb60a0ebb3dbf81a0a59468896a0754df8df92d584d88d33fd158608c23
SHA51292a21fcf759f7d95008726af770796f99af853b9e994a18ed89a805abaa2f4a81370a5c33b48efcdda71ac568ed26a1e4babc717f129a9e5d2245b93a8da5d4e
-
Filesize
129KB
MD50842873e18e92a86ce805694cabb2813
SHA1b0241354d9a98d0e89878426ac8e7f1748d525e4
SHA256620abcc8c60713969acca48a9937080944251ea8171f82856eff40bc0f520e71
SHA5128e55abd51313e6ac9be7eaae4900e82b0e675b3f1ac5ccda3c0ca9b5210d4d7749c81c8b1bd5054bdcce5146b132c8231c19ed9ef4c62c86514764690df12739