Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://casatermopanelor.ro
Resource
win10v2004-20240426-en
General
-
Target
http://casatermopanelor.ro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133624219683880085" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3020 1044 chrome.exe 81 PID 1044 wrote to memory of 3020 1044 chrome.exe 81 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 2276 1044 chrome.exe 82 PID 1044 wrote to memory of 4368 1044 chrome.exe 83 PID 1044 wrote to memory of 4368 1044 chrome.exe 83 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84 PID 1044 wrote to memory of 4632 1044 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://casatermopanelor.ro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaa5fab58,0x7ffbaa5fab68,0x7ffbaa5fab782⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:22⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:12⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4288 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:12⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4512 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2652 --field-trial-handle=1864,i,14709854334100910701,8254738704063808696,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744B
MD5ab80b840ab603b4a1511e8d44d43cef3
SHA1a63cc94d5bc33a7462ac02f2a72496c153442493
SHA256716afd78513fa0bd029b6b2c460840686eef9b7fa70ba6b6ad3b63b16d083f77
SHA51258c5bea40d41d1cc43690ec2e716bed97594a4cf74fed521a480b3461901efa052a1c14da0ac42d0d5e9ea8a0a3e7c14b67c32c21bd505119a460c1a5d71018c
-
Filesize
2KB
MD513210331bd1f10e283b061c69c0794ce
SHA1749083b623f0d4e816a466e85122c9e6c8f3982f
SHA256325d56c276c0943e69c3ddc7447f95efc01ff3cdc07d66263565e676d4ca4c95
SHA5125b057c27a6a401e5f7f961dcbe3ab455c207270758aacfe39060eba35be6c5a44fcaba2d98cd7c0e05468394aef561e6d675b5636fd66e3df0755e0d7d90eb36
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD590424339a35e91bae7c69eb967e98a99
SHA10e90e36c664bf4ae893e8bfefbbfdafd0a7b2781
SHA25610ec1a8f203d1b393dd49b909080a6c4cc76f6e329cc0dba17a5560d72ee1549
SHA5124028cdbc4c91c31796cea89d73c1e13719a47663feb206ed09886b0885ea982fddf08f6521a75d8df7cdf508461cda2fc49654e6d0b176eee38dfef1c1edd0ce
-
Filesize
7KB
MD563c420f0c239789331ae868e37c44866
SHA1a0c3b49cfd36f203c7358a0b42d9dad6a511e039
SHA25615735dfc857add6ba49ec790e5e7e3751609580332e4ed59c806ccbe616ba18e
SHA5128e062dd51ec0570a7261f5e4761031b6d0ecf4a49c1093f36e149e0d908ce650ba5fa01a6fe599195d8d6e1b0fcbdf9e931c6fe7c313e25ab766e7870af13a7f
-
Filesize
7KB
MD5412118d1f9978a8a61bdb30807727bd7
SHA16f2fea5f0a05cc0ba62fb6e8cdb5ac6c0a303c7f
SHA256b5194bcbd9a3c741b16d760ac7fc006e1aad48af07de647692233220c15b004b
SHA512f46fd2dbe0e2f4dd4382a0d4f45bd6901d0b137129b2652d513426774c2991772dda63e3267db5a87ac221c7c5d109dda0d339559353c75d4c8fdb092f2e7fc1
-
Filesize
130KB
MD59541325b52dcb849579c7412e9b15f91
SHA12bf75ff6b3a29478aed4ae7169feea2d94a8f780
SHA25656d8ef613faffb392ee93f15aad66b5caaa024038ff39f2ce335ec3da8fdaeb9
SHA5124477a8e6a76d0bffbe27098856202f65c013c3be80e1944ba546d81d3a2141302cc8494507e9c9a2fbf3b7aad8135fe338c144a8ce147018945ff9d49d8645c2