Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
28/05/2024, 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect.checkpoint.com/v2/___https://www.seankenney.com/include/jump.php?num=https://7x.qa/NHsWQ___.YzJ1OnNhdGd0cHJvMTY4NTQ4MDU4NjYyNjpjOm86MzEyNzI0YjdjYWE3YzQ5YTFmZTFlNWFjYzZiYWY1YzU6NjplNzMzOjJlYmE4ZTJkZTExYWVlZWMwYjU5ZGYyNjZkZWI0MTI5YWRlYWNhM2ViZDVkNDM0MGIyOWM5MzExY2VmZmM5MmE6cDpU
Resource
win10v2004-20240226-es
General
-
Target
https://protect.checkpoint.com/v2/___https://www.seankenney.com/include/jump.php?num=https://7x.qa/NHsWQ___.YzJ1OnNhdGd0cHJvMTY4NTQ4MDU4NjYyNjpjOm86MzEyNzI0YjdjYWE3YzQ5YTFmZTFlNWFjYzZiYWY1YzU6NjplNzMzOjJlYmE4ZTJkZTExYWVlZWMwYjU5ZGYyNjZkZWI0MTI5YWRlYWNhM2ViZDVkNDM0MGIyOWM5MzExY2VmZmM5MmE6cDpU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613806505777723" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 2052 msedge.exe 2052 msedge.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2748 3932 chrome.exe 93 PID 3932 wrote to memory of 2748 3932 chrome.exe 93 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 2400 3932 chrome.exe 95 PID 3932 wrote to memory of 5044 3932 chrome.exe 96 PID 3932 wrote to memory of 5044 3932 chrome.exe 96 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97 PID 3932 wrote to memory of 2604 3932 chrome.exe 97
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect.checkpoint.com/v2/___https://www.seankenney.com/include/jump.php?num=https://7x.qa/NHsWQ___.YzJ1OnNhdGd0cHJvMTY4NTQ4MDU4NjYyNjpjOm86MzEyNzI0YjdjYWE3YzQ5YTFmZTFlNWFjYzZiYWY1YzU6NjplNzMzOjJlYmE4ZTJkZTExYWVlZWMwYjU5ZGYyNjZkZWI0MTI5YWRlYWNhM2ViZDVkNDM0MGIyOWM5MzExY2VmZmM5MmE6cDpU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe9f9758,0x7ffdbe9f9768,0x7ffdbe9f97782⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:22⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 --field-trial-handle=1828,i,6433823587669546986,6784361911277940603,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3484 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1536 --field-trial-handle=1984,i,6250324430674571549,669234090731242346,262144 --variations-seed-version /prefetch:81⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952B
MD59fb5592dad892a76d99373af2a756aaa
SHA148fde81fcccf38a71c0f46b31fc599f0dbad18ec
SHA256e391262bc1d5d76d10c2b72f47702512e3186283dcfcfc8de39eeb27443d3982
SHA512dfe3589080668cf67078f120b57559179378749f3158a52aa272d8e77786b65ae7d40a85de0103f5d711c67d9f4840ac6e26db2e65a0182a8a7c872d4b0d51cc
-
Filesize
535B
MD57f112b94e5239ac8dbce658949e99ae9
SHA134dcb938743fdf45786d384ca2e5fea1f78a3a46
SHA256a82dd9da0091986e8b49ecac0dd0d03ced1ff205ac02d6b64b1ed542d81d9106
SHA512fc58130d5f447a7ad60606661158fe5e0bb474fd7ddf99b72672d09f90b90bdd7224ba850bd81067e61c37cfd91b3e3972b9b4bfb82d5a71f7e2fa37bb97b8e3
-
Filesize
6KB
MD560108052fca1ec57c32eb77092587135
SHA132ae12e4e276debfc0469e333e5d9f5344b0439f
SHA256625a9ec68cd977bf0990bec740fd67115b7bff0ec29d4ee33cbb48b4daca93de
SHA5123c07fcb8e30e5e94315a8f296756670ea5c9c08ae7a776699d8717d4e8893a2a473a4c534ad10afe98031126edf2d57852ac549b747774ec8c2447943e8a6917
-
Filesize
5KB
MD59e1d7caa271e123f7130eae7a1acd38e
SHA1bb358cb5f4287016a726fd0dba4f40ee1f4b71a9
SHA2563b2072477d157226da4530f8ffd7525796b39453f9e49f1e000ee68ea6b6d970
SHA5123f9f7443767cf002f4b6b97e5a47f0f07f3dd8c45b8e9b3d18605060c7ebcde38ae832a1c3590b6978ea26664ca354121f8c962bf4b9d9755208a478e4ef4367
-
Filesize
5KB
MD51fc648593fcd9a7a5e7a599ab476360a
SHA1a206054302241a522fecdfe393a039099d42836f
SHA256ea676f4a7d671e10af8283cdd0943c95ee612c74d006748b6a02d1c2177cbd90
SHA512bd7ddd6046392465f876dfde30a31c3837f1a52cb56dda3b665a4822f7ca9c27d2dce10acd8c384cbda2fe04b2548fc8af52a4e511510d700ea8b372e113ff42
-
Filesize
253KB
MD547595ab6caedc6baef840ad48458be22
SHA1bf64cb08d3459488e3fedd69fdaf04e8929a5c4f
SHA256f16bbaaf5e98786cf203811a947f636061badfb729fd0c521490197cc06ae8e2
SHA51294c323161a66c7207400ab22f84c0fad9496f96ef268b7fd1a0719c3776f73d401617bfd765dcd3a7f95c081290cbbc11cd7dc2f29ef0177c096acdfa91406b2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd