Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
12/02/2023, 17:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://netflixfrance.fr
Resource
win10-20220901-en
10 signatures
300 seconds
General
-
Target
http://netflixfrance.fr
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3184 firefox.exe Token: SeDebugPrivilege 3184 firefox.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3184 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2700 2692 chrome.exe 66 PID 2692 wrote to memory of 2700 2692 chrome.exe 66 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 4068 2692 chrome.exe 69 PID 2692 wrote to memory of 3380 2692 chrome.exe 68 PID 2692 wrote to memory of 3380 2692 chrome.exe 68 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72 PID 2692 wrote to memory of 5080 2692 chrome.exe 72
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://netflixfrance.fr1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xa8,0xd0,0xd4,0xcc,0xd8,0x7ffad9914f50,0x7ffad9914f60,0x7ffad9914f702⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1648 /prefetch:22⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,9280295532748069535,6000098442710018799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4056 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3980
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3184 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3184.0.1668076364\1350894165" -parentBuildID 20200403170909 -prefsHandle 1532 -prefMapHandle 1524 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3184 "\\.\pipe\gecko-crash-server-pipe.3184" 1608 gpu3⤵PID:2768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3184.3.2144226031\1618414038" -childID 1 -isForBrowser -prefsHandle 2028 -prefMapHandle 2272 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3184 "\\.\pipe\gecko-crash-server-pipe.3184" 2292 tab3⤵PID:4792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3184.13.688476876\536966882" -childID 2 -isForBrowser -prefsHandle 3468 -prefMapHandle 3464 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3184 "\\.\pipe\gecko-crash-server-pipe.3184" 3480 tab3⤵PID:3704
-
-