Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 12:37 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/VCERemastered
Resource
win10v2004-20230220-en
General
-
Target
http://bit.ly/VCERemastered
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2144 chrome.exe Token: SeCreatePagefilePrivilege 2144 chrome.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 548 2144 chrome.exe 86 PID 2144 wrote to memory of 548 2144 chrome.exe 86 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1228 2144 chrome.exe 88 PID 2144 wrote to memory of 1228 2144 chrome.exe 88 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bit.ly/VCERemastered1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b6d9758,0x7ffb0b6d9768,0x7ffb0b6d97782⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:22⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4912 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4944 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5444 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5012 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5644 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5424 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4392
Network
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbit.lyIN AResponsebit.lyIN A67.199.248.10bit.lyIN A67.199.248.11
-
Remote address:67.199.248.10:80RequestGET /VCERemastered HTTP/1.1
Host: bit.ly
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Date: Tue, 07 Mar 2023 12:37:52 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 285
Cache-Control: private, max-age=90
Location: https://drive.google.com/u/0/uc?id=1Fkww3iSOS-U4ruThXj_AVjGOSwDx-6oK&export=download&confirm=t&uuid=cb6c95c5-23f2-41b5-96fa-c4021ac896ec&at=ALgDtsw6h72aezd6JOyaZRT3-6j1:1677969908829
Set-Cookie: _bit=n27cBQ-966eec48ab37dd218b-00r; Domain=bit.ly; Expires=Sun, 03 Sep 2023 12:37:52 GMT
Via: 1.1 google
-
Remote address:8.8.8.8:53Requestdrive.google.comIN AResponsedrive.google.comIN A142.251.36.46
-
Remote address:8.8.8.8:53Request163.179.250.142.in-addr.arpaIN PTRResponse163.179.250.142.in-addr.arpaIN PTRams15s41-in-f31e100net
-
Remote address:8.8.8.8:53Request10.248.199.67.in-addr.arpaIN PTRResponse10.248.199.67.in-addr.arpaIN PTRbitly
-
Remote address:8.8.8.8:53Request46.36.251.142.in-addr.arpaIN PTRResponse46.36.251.142.in-addr.arpaIN PTRams17s12-in-f141e100net
-
Remote address:8.8.8.8:53Requestdoc-0s-18-docs.googleusercontent.comIN AResponsedoc-0s-18-docs.googleusercontent.comIN CNAMEgooglehosted.l.googleusercontent.comgooglehosted.l.googleusercontent.comIN A142.250.179.193
-
Remote address:8.8.8.8:53Request210.81.184.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Response193.179.250.142.in-addr.arpaIN PTRams15s42-in-f11e100net
-
Remote address:8.8.8.8:53Request100.39.251.142.in-addr.arpaIN PTRResponse100.39.251.142.in-addr.arpaIN PTRams15s48-in-f41e100net
-
Remote address:8.8.8.8:53Requestapis.google.comIN AResponseapis.google.comIN CNAMEplus.l.google.complus.l.google.comIN A172.217.168.206
-
Remote address:8.8.8.8:53Request206.168.217.172.in-addr.arpaIN PTRResponse206.168.217.172.in-addr.arpaIN PTRams16s32-in-f141e100net
-
618 B 913 B 4 3
HTTP Request
GET http://bit.ly/VCERemasteredHTTP Response
301 -
98 B 52 B 2 1
-
2.5kB 10.4kB 16 21
-
276 B 6
-
276 B 6
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
52 B 84 B 1 1
DNS Request
bit.ly
DNS Response
67.199.248.1067.199.248.11
-
62 B 78 B 1 1
DNS Request
drive.google.com
DNS Response
142.251.36.46
-
2.9kB 7.2kB 6 8
-
74 B 112 B 1 1
DNS Request
163.179.250.142.in-addr.arpa
-
72 B 92 B 1 1
DNS Request
10.248.199.67.in-addr.arpa
-
72 B 111 B 1 1
DNS Request
46.36.251.142.in-addr.arpa
-
82 B 127 B 1 1
DNS Request
doc-0s-18-docs.googleusercontent.com
DNS Response
142.250.179.193
-
383.8kB 37.0MB 5480 29185
-
72 B 146 B 1 1
DNS Request
210.81.184.52.in-addr.arpa
-
112 B 1
-
136 B 2
-
73 B 111 B 1 1
DNS Request
100.39.251.142.in-addr.arpa
-
61 B 98 B 1 1
DNS Request
apis.google.com
DNS Response
172.217.168.206
-
4.7kB 47.8kB 28 42
-
74 B 113 B 1 1
DNS Request
206.168.217.172.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD56910a46cc5b46d9d9471a5eebca05013
SHA1c8eb93671b311e2e8097b69d529e85bf8db5b918
SHA2562f7ba30490d959c692f0c3d94e17cafc7d5a1e8f0baead922610f6e98b3efe1e
SHA512b52766a77be2a0bf5cac1ce9ec5ede85f4382abd0324d328ff39585d4655685e0879a7ddeabb1382ba69081f06d06a8bcc04682b7ed91914cf06cd434cf4b789
-
Filesize
5KB
MD580a9c038c9a4b010e8c48b393bcaa64f
SHA1ce73296702a3ca7ea34487727cd3d04ed3c02140
SHA256ddefb81557d7476a99fe6a544798e8e2764bb6afd9a4301cdf07333f006b0237
SHA512b5a27272b83a0a6fbfe9f45d8d904bfaefa7732ddbe7322e2389179ee1717b52169e36b051db49012dbdaeb9444ff4f202242ef1d1df66be437e23e0313faf74
-
Filesize
143KB
MD5e9adccbc51ca4768ed6927d7ad30bd05
SHA12a233679223db911719e3259d3f090833456a0c0
SHA25615b0a08df92de63206f77cd11cce3596b0d61e1b9a8600885720152d80dd11b7
SHA51210c3da0dbe5a9070b39961093035d46a8ad443aadb2b821f1be08b3618ff984763a4b53311d8639843dd01b1db17e0f9de48c6ff8020107a113e9572f2f3b385
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
6.7MB
MD5d412e3327b84ac68ae46fa630d5d8007
SHA108339516a2e5259d7980654a41ca24ee05e1e255
SHA2567def8eda353da7150e935d8b1a57a2e8cbb6a4f458c1e773e1129c959e9a1f03
SHA5125aefa4f2b25a8c15aa2d4c9986dbcd7759ce2bf28ec54dfa9f6a1213cf36474ed20fab889cee09f488181d2fe606033a3e78454b30f79ed821cd0afe387dd7c3