Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 08:55
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.jomba.co.il/account/[email protected]
Resource
win10v2004-20240611-en
General
-
Target
https://www.jomba.co.il/account/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642977483950169" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4756 chrome.exe 4756 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeCreatePagefilePrivilege 4756 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2148 4756 chrome.exe 83 PID 4756 wrote to memory of 2148 4756 chrome.exe 83 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3992 4756 chrome.exe 84 PID 4756 wrote to memory of 3512 4756 chrome.exe 85 PID 4756 wrote to memory of 3512 4756 chrome.exe 85 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86 PID 4756 wrote to memory of 1420 4756 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.jomba.co.il/account/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4fabab58,0x7ffd4fabab68,0x7ffd4fabab782⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:22⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:12⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:12⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4224 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4464 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3272 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1008 --field-trial-handle=1864,i,1619000874805921690,12167848346467470450,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD593d1bb019d48a61a5262a317837f7ddd
SHA14c6b781e30fda8b012c6fbc35e385f39502c74ed
SHA256b7bf690477694dd8444537b673945c6e058d677c57ce54ead22f14abbbbbfadf
SHA51247b2fba74ddc8b6e78beba533346394df1f3854667bc822f82832d165541eef2b7082db6532c273b40193eebc0e6bd7aaa15cb9229e7fd70f1fd6ca1b5c81642
-
Filesize
7KB
MD521e919e432488f091fefc59dc756bf2a
SHA175413474ceeafa3211329fc3e14df0a2c9b92d23
SHA256eaf2bfc40b02044dfa28582c6e8cee08cfabf0ee9188710e4c7b809a1a159ad8
SHA512b3122b8e32761ba01c7bd6a3280f2f389686aa4f62cb6a3d2f296cbc01a6174f5cc558b59abdb72904ede41934cc75d9418a827b4b8fa300bf025e9e44ffbb2c
-
Filesize
7KB
MD5d19e50b9e4ac84a375150385e49e1e93
SHA1aa703455763bfe89aac0b3aa9199c6f1549df0f7
SHA256f1285e036affa397effce24007f4ca1e3ebb4d8c361a4572eea464499c50b25a
SHA512d62c39f21597fcb57388115ac2ea070fbf2ca5b2be10a151a933415c04ba5190fce04e5ca5f11b2afea0a997441ae66f7621499ea5dc03c186cf4128e0323419
-
Filesize
138KB
MD5ba56e511b95acacd2b9eb97d9e2b95c0
SHA1764a5c00fd6088c57d79329441f68b16543d8319
SHA25625feca5f4a53257f85d5f840662bb3ab7192e663c32b079d63b38dcf4c79549e
SHA512d41d03434199dbdef70aac150df43d0317c7a90419ee97a8cc49c2437727e8c899262fefef1de824124ddf3f9a2f9a777baf45dc0aaec48d390c1bb5899d389e