Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/05/2024, 07:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://backdoormn.com
Resource
win10-20240404-en
General
-
Target
http://backdoormn.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609233363164842" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 1776 chrome.exe 1776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe Token: SeShutdownPrivilege 3608 chrome.exe Token: SeCreatePagefilePrivilege 3608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe 3608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 1384 3608 chrome.exe 74 PID 3608 wrote to memory of 1384 3608 chrome.exe 74 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4340 3608 chrome.exe 76 PID 3608 wrote to memory of 4552 3608 chrome.exe 77 PID 3608 wrote to memory of 4552 3608 chrome.exe 77 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78 PID 3608 wrote to memory of 4652 3608 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://backdoormn.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8cbe39758,0x7ff8cbe39768,0x7ff8cbe397782⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:22⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2648 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2772 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2768 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2784 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 --field-trial-handle=1840,i,9538281997737839526,10788565621893367714,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD540493cf764095c9b552f36f39940e5ed
SHA190d1416ea5c6b190d5929c598ed8e7de76d441e5
SHA2562cf677338eb664de7bd9a491b6b23a71229836c2692b28294f6557875ef04c00
SHA5120c86f3c1dc169670c75b51a83ce1e44c315b6d2288eb365e8da0ce3b0418621d69e91f3e0f4f724be80c7592434f5252cd7b70ea680022313977654d20497d92
-
Filesize
1KB
MD50f125cc6c51aaf1cb5802b8eb7b60629
SHA1939fd3b12166409168425d8039a12d062875f34a
SHA25667dd5a9af972c8e2487ca77d166b622fb024ff17388c502381aa6b3885207e90
SHA5122484e4c825018cc078822c660b76dc72a04ace7719d3bfe7fb2df8bf06e926813b3669c4a710e69d859d88773d4fa71f3a5d89034c2542fdaed15398a90c1b53
-
Filesize
705B
MD595357958d154ec7a2f91bdeb0ae6ba59
SHA103c0100e93e59a63b2129e3e62983bef80e37cbd
SHA256533f365bcaa69c62108e090829ef3caa726e9a4a7710a9b90cfa69f75082f1bf
SHA5128640e35cfabb66778ebcb9d836c95e758b951bf3a92e2079c5dac7367f516ea7960a467a3ec9153c0357afe1fc6be832d726c3bd3d17c1af9f17e69f52d9ed86
-
Filesize
6KB
MD5131c4933a5425a768cfe87653c3bbc31
SHA181296a05380cff981f30049b4adc5476c0816dcd
SHA25606485dde675e1bab5feac5b54071590439f75fdd6292261f24c744e437b20c9c
SHA512920d0fb7a47994824c3d392e8de2cb08f9ba0ea02b2073803b899c9533925273b31fa7b33efcff0f1c8c4f97191549b04290649623e392bc66d40ab8b6c4e5f3
-
Filesize
138KB
MD55f6d10eff019dd4aea42f2e9486b7e85
SHA103d9f9fa98ca3511808d8c0fc4f85611389eeeab
SHA256d059b921fe44ba069270e194a8712d5e6b482ae9c3d28ce2ddf8d61623d350ca
SHA512996899a4809b87096b3db44ae2762af922715b581c7e607aaf07b3f7bde7d5833b6e0281c7c3cf7b94d94b88cf8f7ee374af13f7ae5605bb97f7cea8c2818457
-
Filesize
138KB
MD5d557fbb5208d4f0db68f712cd9c9c18d
SHA1323feb718ce5970d3b17f681d63350b2c5a287ed
SHA256a7f30b466d67725a381ffee6de81763cf5d53b31a0c8fb0bd5622834ea34c0cf
SHA5126b8874b7818cd1edf4b7c5e00427825a4db86b72ecfce943b718d87601d4b2a51410a002598c6c8162862178657eec0cfa59c434a1e454bc73adc42055608418
-
Filesize
137KB
MD5f2ff53dc5db85fd3c2d4fcf7a8da46ee
SHA15fd0653198b85b2ace48e3f3cce243645428bb29
SHA25644eb36dae190b079b31d393bed4d1f3e5c2e124029b2fd429d430a67c5144620
SHA512883b0674d526249cc1b96ca228d64a9512f94843c8826988c419fb59daeea6910d221fcc0c09d59001ff4295d92f55c39c967c14dbd0825d6babbc2a9f034abc
-
Filesize
157KB
MD5a7daf59945050761a5a37a2854cb5506
SHA175be7947969a0f15600a5bc3fca6e816e19dcaf5
SHA25653baa80bf9ad420efe9a1ac95167a39e8d7be0330d6cbd82494aa31016bec918
SHA5126e8ebb1eca09622ce65e7affe34ff70fcbd40e2abc4234177b5f2b31acc89ee633422ff4cee727fd1def614b3a8ab3141e203878b85f0b96ace191c39d96f093
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd