Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 09:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://voicemessage-cpanel988.web.app/
Resource
win10-20230220-en
General
-
Target
https://voicemessage-cpanel988.web.app/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221377601259392" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 3408 chrome.exe 3408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1820 1792 chrome.exe 66 PID 1792 wrote to memory of 1820 1792 chrome.exe 66 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 2904 1792 chrome.exe 68 PID 1792 wrote to memory of 3792 1792 chrome.exe 69 PID 1792 wrote to memory of 3792 1792 chrome.exe 69 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70 PID 1792 wrote to memory of 5060 1792 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://voicemessage-cpanel988.web.app/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8bbc59758,0x7ff8bbc59768,0x7ff8bbc597782⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:22⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:82⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4576 --field-trial-handle=1756,i,15178218821405886917,7353991980345761019,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD51f5aa77f31bad85248870ec7af8ef48e
SHA1ff61d0d0b660c9f2f1b9e3e3444920ca36c07d18
SHA2563d11bd165ec74f244e2083b14cab20765a69830c11c289fd309e7f257bf6063c
SHA51270524e18d659c15cf0430a993444c5b863229a0b928a7906370cedd17fd4e5c264878f308ad8be2e9ecbc6ac3a93972bd051c86794dd54fb0d9cfb6a7ce912eb
-
Filesize
1KB
MD5f262c8317e2269453c3c65c47164b553
SHA15aeb1e9357dfde2dce0b931c10c92e5c9b13ee5a
SHA25616000b32e5f1edf65e58e77ca88b38af215275e0fc2ccc618add9e1e93edc0fc
SHA5122c4f697e1596ba585bf343af684c9571f4c249d2cc2476453603ff383ed5e08e8d4a1bf9408c31dfafb77e35ccbf6836b0bde66fb8fc95593819b3d214815775
-
Filesize
538B
MD53d756a9b50556fe0414bac0c8863f4c8
SHA1a48919900c664ec2615140f5db9dd0eacb0cc302
SHA256d924d3bb0637c5e9df977b0798ead8712ea071cd8139684b3b800ea5daefc994
SHA51215788b8ae3d1488afc1c1f6f230ab8d92903d8e8b366962c771015c345ff55b6a12dc32c35210f73181c08903814ce420f1204a8e06c04e1812746dbd1700bd9
-
Filesize
5KB
MD58e42bf49019469c2d022bf19afef7ed6
SHA11da57ad777497044de819dd15bc4b3f1264392d0
SHA2560f7caa1d71e5080b7184665e6a3c3749d049b1280e059e400045de4877becc08
SHA512bd14e067cd90873f3b601bb7a4d8b95863ddf4850378bc3292a15bf1ce805fc81fb778053e618e3f6207ee5957c5f836dca36428c2a2a0234e19082e0836048c
-
Filesize
5KB
MD508e940dadb364f08ac476fc6e28ab4bd
SHA13b595d87a672a6f4d1b31bb040373abb97c9148d
SHA2560ec7c107cb02fe03b1af5aa5f00af8eed5a78caf80bcd4b0df2833eaabbd362f
SHA512cce8374185b3393e6c234c2098f662dfc1b038508866c687d5220547bb64eb50cc35ff9fc44483a01e7cebd5e5f6c126444db69a866f4c8cf8befae2d3767261
-
Filesize
5KB
MD57bd60df06133fff25678c85884f399c1
SHA1703eedd2ca25587b137860c49bdc62480b28500e
SHA256a4cbd3ef1c64d07e8cd0aec164506c7f1e5801c1c8691463c742834903c9aa0f
SHA512a126504521cd85d55b54671ff198f8091309478b399427be2e4e13e9f905098e895aef266f724136d7e0cbae52a5dfd66e18ad2e04b243edd0af53c3b01dc0af
-
Filesize
141KB
MD58a8459aa86f0accbb19ef04aecd16cad
SHA14f396232b8bceb7dbc094ab90e74f29c3af381af
SHA2565ba77547f169075eff7f03ba8ca7f81a6f0c129df9201c124c35fe7f00e4b2e8
SHA512483851a81667a535e2a5902434452a4fd7cee8e2a2ca5c3dd5eb4c05044a6bb9b2a959b75918c25c95f0ddea1bb9f5aa6f30c00399f70b4b67abb79b7513f361
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd