Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
31/05/2024, 20:23
240531-y6d54sca3z 631/05/2024, 18:10
240531-wsfexagb5x 131/05/2024, 17:57
240531-wjlwbsfg8v 6Analysis
-
max time kernel
600s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 18:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://WTmrVfzBEi.esmeriocontabilidade.com.br/Golf/future.com/5MTE0XyUvddHaCu5rQ21ZpgdMMqDVaFyCyeBzYy3YKiKgHKLLWq8pXY9KiAVYP2BTqwZ9gFjZfUghzQcC9kyB1gfJmu2ebUNmRjGCzJ4RwcxVJWJH9pv78uuEjWKhL0iAz9Mdy7JQaLNFi8EE9y6Na3FjPUp0f1WwxQrJSD9xGypM2nuJy2GKkVGCcLwESgp7y7in7tvLSFZgMKGpr3cN35mAJQhiWpNZngRx-YmFua3J1cHRjeS5hbXN0ZXJkYW1AZGVudG9ucy5jb20=
Resource
win10v2004-20240426-en
General
-
Target
https://WTmrVfzBEi.esmeriocontabilidade.com.br/Golf/future.com/5MTE0XyUvddHaCu5rQ21ZpgdMMqDVaFyCyeBzYy3YKiKgHKLLWq8pXY9KiAVYP2BTqwZ9gFjZfUghzQcC9kyB1gfJmu2ebUNmRjGCzJ4RwcxVJWJH9pv78uuEjWKhL0iAz9Mdy7JQaLNFi8EE9y6Na3FjPUp0f1WwxQrJSD9xGypM2nuJy2GKkVGCcLwESgp7y7in7tvLSFZgMKGpr3cN35mAJQhiWpNZngRx-YmFua3J1cHRjeS5hbXN0ZXJkYW1AZGVudG9ucy5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133616539385647886" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4556 4852 chrome.exe 81 PID 4852 wrote to memory of 4556 4852 chrome.exe 81 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 3396 4852 chrome.exe 83 PID 4852 wrote to memory of 828 4852 chrome.exe 84 PID 4852 wrote to memory of 828 4852 chrome.exe 84 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85 PID 4852 wrote to memory of 2340 4852 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://WTmrVfzBEi.esmeriocontabilidade.com.br/Golf/future.com/5MTE0XyUvddHaCu5rQ21ZpgdMMqDVaFyCyeBzYy3YKiKgHKLLWq8pXY9KiAVYP2BTqwZ9gFjZfUghzQcC9kyB1gfJmu2ebUNmRjGCzJ4RwcxVJWJH9pv78uuEjWKhL0iAz9Mdy7JQaLNFi8EE9y6Na3FjPUp0f1WwxQrJSD9xGypM2nuJy2GKkVGCcLwESgp7y7in7tvLSFZgMKGpr3cN35mAJQhiWpNZngRx-YmFua3J1cHRjeS5hbXN0ZXJkYW1AZGVudG9ucy5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec8ab58,0x7ffa1ec8ab68,0x7ffa1ec8ab782⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:22⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:82⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:82⤵PID:5740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1852,i,12727304045960452537,12604998092640193489,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570462775104af02774adcf19ddddbcaf
SHA17239d2220770bf7c1fe64de1249c6accb901fa46
SHA256d5c7c86dabfb07c3045bab25bb493736fc294c80cfb5e546789fe9f48aea651d
SHA5124faf7ada2f6537f56b3d23357460d67846fd439d8a82a4775266377f9e22596dedfd95ed1971eea9cae5ea316848fc66cf9906db6440aa74290379555d9543b2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD550fc9a0b2a4262eaa2bbf9ed4a1beb10
SHA11607d2d68162ab7f9a006ed77f8e2bd41d928097
SHA256463e9668d051bf6110fee299a6cfdc5cbd07630beff9333260e4f289b8b3574c
SHA5129e6cdda6474904ad1e124814b64ad947581902408054d7ede6a9a53e4c231d129b0175202aad64a9ea6f737e7ea2926dedb969b4018761708646b984df07ff42
-
Filesize
130KB
MD5112b129963c07c93f0853c2b5ce7c552
SHA12ac9445e9d8e76de653dacc41f1ebf2e9a15d135
SHA256d614c1869d3eeb821197e17e85b236424f2052e648e616fc57bb83d7809cbc8f
SHA5126ef3a0ff0b98ef802c1674d5acd9cc3b6350430898a6b4afed0c8af69a6929037f858c6c965b8199dc78ca4d62552cdcf87a2bf6cc7a16144335d0a4f004f050