Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 22:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.visaonline.com/login/Login-Contact-Us.aspx
Resource
win10v2004-20230220-en
General
-
Target
https://www.visaonline.com/login/Login-Contact-Us.aspx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221825899705765" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1444 chrome.exe 1444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 548 1532 chrome.exe 86 PID 1532 wrote to memory of 548 1532 chrome.exe 86 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 3564 1532 chrome.exe 87 PID 1532 wrote to memory of 4296 1532 chrome.exe 88 PID 1532 wrote to memory of 4296 1532 chrome.exe 88 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89 PID 1532 wrote to memory of 3788 1532 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.visaonline.com/login/Login-Contact-Us.aspx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:22⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:12⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1824,i,17248938760216092304,6049903053600378450,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5bfbf912910b8ba3f5ed561c3c2143ad0
SHA16cc4357c0701b3502279101041ba86ce19a90171
SHA25608b0d4ce56c6bd9687eb85e5050c3a58685aebceafb02b2b9cb1f067d1a27cad
SHA5121f8962335317e6642a1f2a785e273c6a405de7213bed0a8f2095f384861110b5e6f0d6d6200aebdb98ec9aa5f70bbb79198158aa4426d9f1c5a559e6dd855402
-
Filesize
2KB
MD5db32726246f1b47c8d49cd839a1eb3c9
SHA13a4b846988188bc8dc37751d28135b0b568775af
SHA2563dc8aebffd213ecc2529f5abc92e161035c54e1830e7852e067d556ee25a7972
SHA512d98943d4cb53c072c711873a3f43e1ba90b2d62a5bd6992e0055df524027941abefa989be0440b7c2f36ef7564e190b8b894634530fecfada507f4459ece77d0
-
Filesize
2KB
MD5ce9f21b060469414e7d18569d6ae6d3e
SHA1051bfbfd90025bc784511a6a35afe210a7813ccb
SHA256dae93f9c97793ebafb6286bc0cd4e32a7dfce794df25082aeccc9a32983dd228
SHA512a24e26a747d473113dcfad93a049002a8a9b31d26e864745e0b58c394b6412d6732eda296a8857ed31bcf20d541dd2fd5f6594f8c5cc61594e09d0a0346024e9
-
Filesize
2KB
MD500509b7102f347bd8ae22de348362a36
SHA1d01cd934aa3eab39b9b13b8b0355ad194f7374b3
SHA256a93e75492c899e0b73587830ca10b7652f685ebdf93677cb5bbca7428799c600
SHA512c08be73925207e934db9717667b7b9f0e4104be155a621c8c78dc268fbeb624802af3b7b9f59bb07c91ae334b170b634179d5a319144054f1a6c71a05aa66ad4
-
Filesize
1KB
MD569a527e91b4af5b4554c75c40d2ba583
SHA18be09273a91063afd72e4ca36cbfc7afab39fcf1
SHA2560161669d69df1191057c7f378fcb7c4639e3fb5035e67cf8e0753f6e569f9d6d
SHA51226a2f1a58e68d431f3764955d7512e5609eca12dfbd144fc6faa23b5534951deb3f619d85057502aa60b3d4b184e22bac7625da1d344db6d5a50d72e1d636659
-
Filesize
5KB
MD5ffe6279516974199386de95e4cfc7aea
SHA105b0ba96077b026e250aa1b22fa046154bdfc7eb
SHA256389d8629525a21eac533c68407064f7c765ec129f5623aeac521bc0a2cad6b99
SHA5120dada739dc6e5e467eabadd92f4a771be9b018ecaf7a46cac34ba28f2615431ccc6aeba747df5397f1a1620180f3b7b8b43efa1c09d2434588f05086839a59cf
-
Filesize
5KB
MD53f9390755872e57d1dcc70ed6d7a3caa
SHA1e3fe0360c9adc66ba0f8dc63fa2fb0c65f8638c2
SHA2569c6e8bf8ba176c4444ebc583541d819bac7684af016eee279c015eea39d5a532
SHA512b3183d8803600da3522740ea7a00a7330d0fdef5f81ef0b8a1502bf4bb7a2f75eec811c708e5af780afdb2c1cb88328ba623f9f9598217f49981f1909f10b2d5
-
Filesize
5KB
MD5c8d6ca7e7e86cdeca862927a7a7478f8
SHA150806233ccb6a38b0d2af4683a9d383e219cf1ef
SHA256152a7a7942c1043f7a4360365e9e55d79c5acd3516d5882a7f05e14b8aa117f1
SHA512479ed70dca01c1494dc5199a546e4758e86cb4708d6d3b6928f8badefb1698d7dc1550cd4c8574b0146a5a0480e814bc6a7b61a7575166c95bc963a41fd41c06
-
Filesize
141KB
MD5cbd42c6e81815295a7c6a17029c707dd
SHA1a8a0c47506329721ac7af7daf3b5dffdb9e7540e
SHA256be2966f15160642e0e1a20beed7e20ae9460a19ba9846152c23bda9bd416dd6f
SHA5124dff68252e50882ce5a550f7220dec54e8fddffd42970a2fa00c4b39e76dc2793e7d0665cffeabe98e117442bf0ec78ee96aef49440ca3cfaf384c19e4a47486
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd