Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
559s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/06/2024, 15:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/tvvxgj6ecf1riwm/Afterleaks.pyw/file
Resource
win10-20240404-en
General
-
Target
https://www.mediafire.com/file/tvvxgj6ecf1riwm/Afterleaks.pyw/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619936385407948" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 1116 3296 chrome.exe 75 PID 3296 wrote to memory of 1116 3296 chrome.exe 75 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3060 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 78 PID 3296 wrote to memory of 3152 3296 chrome.exe 78 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/tvvxgj6ecf1riwm/Afterleaks.pyw/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe2d509758,0x7ffe2d509768,0x7ffe2d5097782⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:22⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1692 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1992 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4544 --field-trial-handle=1832,i,8732077638077825747,9490546163354825327,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ce024fcf315a0a6389791984c25f2fde
SHA1fcad38c3b14f9b00d2030834e8f3a13727a5462a
SHA2563d54d678250c32e28c8739ef6f19a76b018a235962edd80fcdebca54168e1d2d
SHA51263c1aa3bae150acc61caab0d76b5ebfea39e3e7ffed7fca45f6933d29cd0ee5381e4fa30127bb531dd39e1b10578f015cb29bb69f8e4ebc536e6f0c5ed45f4d5
-
Filesize
6KB
MD5fab72b7d0c06435c623681cecc605b1a
SHA1a6203e7b580d1a3c7459b98b4ace284b7a204b55
SHA25695de57a35be8dc6648fd2925f5a9b976cd3ae0af6cd9f0c331e1539a28fb22b3
SHA51288fa78dd8bc7eccafaa22204de7e26194be1b26f2a03f6112abc010c63bb4632f1016f4368e3b10be7d8da774047de386935511859a1eda3d0c4a9de69839f6c
-
Filesize
6KB
MD5fd445de96838e0c0258605f9747fb5da
SHA162a2a82deb09f4fb5a469a465717ea7b66a32553
SHA2563315ab23e5512d1e1f69e698f21fb65b127749f3fb036680b20941008292d20f
SHA51289e1d54cb162b00c4fb489c178d2fce74e6021424f5fe468ee1a792154d5cdc49ee047260763a23dd30e8c77ad068009275ced76c5dfcb91305e1850dc679d63
-
Filesize
1KB
MD525a12f317c92c4b170afe17bb95ebf6d
SHA113cdc6b7250b5c6e5937c48aed45b3f8e02f706a
SHA256f4b214720d16774d94eceb278bc6ef252011301f775080318e3c8368a323c044
SHA512e02691aa3b746b665e8794da2a9401d504f7785a9049c82bce22c9bfb04e4a786b415a2f998cfdeddd214eda23bc93c0fa467f7e51f283ac648383a1291348eb
-
Filesize
6KB
MD552ea5bb2ab61c3972b03d661db4edd41
SHA1a6ce4812eb6ea16e6323685d31c7a8d75f46e79f
SHA2561b2c27128c33f130e5e736c3a4ec6ec9592fd4d6ddc4bf5b93f130b03c51af3a
SHA5127fd25e9c7b20eb90579ab8ada9aa9056f86d0589c305e72e434e8baa22767357ef819edb7156493fdc9bd3f4990c9a4aa669adef4cf1c1f0693f7ce374d2897d
-
Filesize
6KB
MD5ce4a9e813b8151a39220f96513f7f6de
SHA165290376c686eadc0b3db737daedd2b4de2247d7
SHA2561a58249b9f146e372bfba484d68e36c2ee5e9fb9e246de862fc2eb3d8658f8f2
SHA512102b8c2ed5edcb9cff432b7e3677b89043cba92d08e91af6fe82a9504412e43d8cd34cca71eb23cb00a8285e48810d1c52ec1975cc2b7174f41ca95a5457af78
-
Filesize
6KB
MD526774bdfbdfa30653b6cd4798c04eeca
SHA1cba3d38a8440455aec00429f615feaafc04f1b5d
SHA25614e1fda6aa9150015bb4dfb82f6caa361bcc4b06fc2378b963a8eee2027e7431
SHA51298c159e26fea169fd9a7698c5498151f265ab87dc6c90cd78a0ff5de9225a34fba31dbfd31c8fb154a90494dcf1a5cd2bf78ca1dc4e999554a866a2d55e0e0c5
-
Filesize
136KB
MD51838a354f318b0648e705eba515e9cfd
SHA17763e71b0c1f363081be886c6e3a1f267f890f9f
SHA25698285a647a8ad2bacfd715196e8fef5a0f7774085cda677b4e9db368f2c686b8
SHA512433ef305a63e37a94419b29efbc8bb4cdb8ac3b1f195e7c61c3e2e3eb11bfecea5a16af8fe1ddbcfb0f8e28e7f73df2443996c837b509c2e0197037cc2afdeb4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd